Open sparkEchooo opened 8 months ago
Dear jaeger-operator maintainers, I am Xingyu Liu, and I found this potential risk in jaeger-operator that can be leveraged to get the cluster's admin token, resulting in cluster-level privilege escalation. These are some similar issues that have been confirmed for your reference: kubewarden (https://nvd.nist.gov/vuln/detail/CVE-2023-22645) Clusternet (https://nvd.nist.gov/vuln/detail/CVE-2023-30622) OpenFeature (https://nvd.nist.gov/vuln/detail/CVE-2023-29018)
I hope this information will assist you in better understanding and addressing my report. If you require any further details about the report itself, please feel free to contact me. Looking forward to your reply!
I wonder who manages configuration files for https://console.cloud.google.com/marketplace/product/google/jaeger-operator. It shows Jaeger version 1.45 which is quite old (the new one is 1.55).
I would recommend installing jaeger-operator via officially maintained https://operatorhub.io/operator/jaeger. The required RBAC is defined in https://github.com/k8s-operatorhub/community-operators/blob/main/operators/jaeger/1.55.0/manifests/jaeger-operator.clusterserviceversion.yaml#L108.
The official documentation also covers how to install the operator without cluster roles https://www.jaegertracing.io/docs/1.56/operator/#install-modes
Hi! Sorry for the delay.
I would like to inquire if there are any plans to update the Jaeger version on the GCP Marketplace. If an update is planned, would it be possible for us to receive public thanks for our efforts? We believe that such recognition would be a great encouragement for our team and would further motivate us to contribute to the enhancement of the platform.
If you're looking to update Jaeger on the GCP Marketplace, this might help: "https://cloud.google.com/marketplace/docs/partners/kubernetes/maintaining-product".
Looking forward to your reply!
As @pavolloffay pointed, we don't manage the GCP Marketplace Jaeger Operator. Also, we don't know who maintains it.
What happened?
Summary
The jaeger-operator in GKE gave excessive authority when defining Service Account named "jaeger-operator-operator-serviceaccountname-d705". Besides, this Service Account is mounted in a deployment named "jaeger-operator-1-jaeger-operator", witch makes it possible for attackers to raise rights to administrators.
Detailed Analysis
Attacking Strategy
If a malicious user controls a specific worker node which has the deployment mentioned above , or steals the Service Account token mentioned above. He/She can raise permissions to administrator level and control the whole cluster.
Mitigation Discussion
A few questions
If it's a real issue, does jaeger-operator plan to fix this issue?
Steps to reproduce
Expected behavior
Permission escalation
Relevant log output
No response
Screenshot
No response
Additional context
No response
Jaeger backend version
No response
SDK
No response
Pipeline
No response
Stogage backend
No response
Operating system
No response
Deployment model
No response
Deployment configs
No response