Skip to content

Use finegrained kubelet API authorization #2307

@vinayakankugoyal

Description

@vinayakankugoyal

Granting nodes/proxy with even the get verb can be used by attackers to gain privileges. This risk has been highlighted in the kubernetes documentation in https://kubernetes.io/docs/concepts/security/rbac-good-practices/#access-to-proxy-subresource-of-nodes and https://kubernetes.io/docs/concepts/security/api-server-bypass-risks/#kubelet-api and more recently in - https://grahamhelton.com/blog/nodes-proxy-rce.

We found the following instances of nodes/proxy being used in this repository

https://github.com/search?q=%22nodes%2Fproxy%22+repo%3Akubernetes-sigs%2Fblob-csi-driver&type=code

Please update the workloads to use fine-grained kubelet API authorization KEP and replace nodes/proxy with more fine-grained permissions. See this link for how to update your RBAC config.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions