Sharing this blog post we published on 8 insecure Kubernetes pod configurations and the corresponding methods for achieving privilege escalation. While it’s intended for pentesters to an extent, it’s also useful information for Kubernetes administrators to better understand common misconfiguration scenarios. Feel free to leave feedback in the comments; thanks for reading!
Related topics
Topic | Replies | Views | Activity | |
---|---|---|---|---|
A Blog Post on Encrypting Communications between Kubernetes Objects | 0 | 533 | January 27, 2021 | |
[Security Advisory] CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation | 0 | 5204 | August 23, 2023 | |
[Security Advisory] CVE-2023-5528: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes | 0 | 1425 | November 14, 2023 | |
[Security Advisory] CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation | 0 | 1954 | August 23, 2023 | |
Request for feedback on Kubernetes security misconfiguration detection tool | 0 | 451 | July 25, 2022 |