A potential risk of airflow makes a worker node get the token of any Service Account #2582
Labels
kind/k8s
Related to the Kubernetes application
needs-triage
This wasn't investigate by the repo's owners yet
Summary
The Airflow Operator in GKE gave excessive authority when defining Service Account named "airflow". Besides, this Service Account is mounted into deployments named "airflow-1-web" and "airflow-1-scheduler", witch makes it possible for attackers to raise rights to administrators in k8s.
Detailed Analysis
Attacking Strategy
If a malicious user controls a specific worker node which has the deployments mentioned above, or steals one of the SA token mentioned above. He/She can raise permissions to administrator level and control the whole cluster.
For example,
Mitigation Discussion
A few questions
Reporter List
Xingyu Liu(ll.travor@outlook.com, me)
Nanzi Yang(952508578nanziyang@gmail.com/nzyang@stu.xidian.edu.cn)
Xunqi Liu(xunqiliu@stu.xidian.edu.cn)
Xin Guo(guox@stu.xidian.edu.cn)
Wenbo Shen(shenwenbo@zju.edu.cn)
Jinku Li(jkli@xidian.edu.cn)
The text was updated successfully, but these errors were encountered: