Open sparkEchooo opened 8 months ago
Dear calleido maintainers: I am Xingyu Liu, and I found this potential risk in calleido that can be leveraged to get the cluster's admin token, resulting in cluster-level privilege escalation. These are some similar issues that have been confirmed for your reference: kubewarden (https://nvd.nist.gov/vuln/detail/CVE-2023-22645) Clusternet (https://nvd.nist.gov/vuln/detail/CVE-2023-30622) OpenFeature (https://nvd.nist.gov/vuln/detail/CVE-2023-29018)
I hope this information will assist you in better understanding and addressing my report. If you require any further details about the report itself, please feel free to contact me. I am looking forward to your reply!
Hi there,
Would it be possible to kindly inquire about the progress of the survey? Looking forward to your reply!
Hi there,
Gentle ping for the request.
Best regards, Xingyu Liu
Hi! It is on our schedule for next release.
Hi, Thank you for your reply! May I ask whether you plan to fix this issue in a new version? If so, Can you give us a moderate CVE or public thanks for awarding our efforts? Thanks again!
Hi, Gentle ping for the above request.
Summary
The calleido in GKE gave excessive authority when defining Service Account named "calleido-cert-manager-cainjector". Besides, this Service Account is mounted in a Pod named "calleido-cert-manager-cainjector", witch makes it possible for attackers to raise rights to administrators.
Detailed Analysis
Attacking Strategy
If a malicious user controls a specific worker node which has the Pod mentioned above , or steals the Service Account token mentioned above. He/She can raise permissions to administrator level and control the whole cluster. For example,
Mitigation Discussion
A few questions