A potential risk of airflow makes a worker node get the token of any Service Account #2582
Labels
kind/k8s
Related to the Kubernetes application
needs-triage
This wasn't investigate by the repo's owners yet
Summary
The Airflow Operator in GKE gave excessive authority when defining Service Account named "airflow". Besides, this Service Account is mounted into deployments named "airflow-1-web" and "airflow-1-scheduler", witch makes it possible for attackers to raise rights to administrators in k8s.
Detailed Analysis
Attacking Strategy
If a malicious user controls a specific worker node which has the deployments mentioned above, or steals one of the SA token mentioned above. He/She can raise permissions to administrator level and control the whole cluster.
For example,
Mitigation Discussion
A few questions
Reporter List
Xingyu Liu([email protected], me)
Nanzi Yang([email protected]/[email protected])
Xunqi Liu([email protected])
Xin Guo([email protected])
Wenbo Shen([email protected])
Jinku Li([email protected])
The text was updated successfully, but these errors were encountered: