Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Wednesday December 05 2018, @10:37AM   Printer-friendly
from the just-make-containers-all-the-way-down dept.

First major security flaw in popular cloud container orchestrator Kubernetes discovered – and it may be impossible to tell if you have been compromised

As outlined on Redhat’s website, the security hole or “privilege escalation flaw” is a nasty piece of work. In a nutshell, it makes it possible for any user to gain full administrator privileges on any compute node being run in a Kubernetes cluster.

[...] The vulnerability itself is located in the Kubernetes API server. Using a specially crafted connection request, the hacker can connect through the Kubernetes API server direct to the backend. Once in the network, they can then send arbitrary requests over the same connection to the backend server.

Perhaps most alarmingly, the Kubernetes API server connections to the backend are all authenticated with Kubernetes Transport Layer Security (TLS) credentials – meaning all the nefarious connections appear above board and applications functioning as normal.

[...] “There is no simple way to detect whether this vulnerability has been used. Because the unauthorized requests are made over an established connection, they do not appear in the Kubernetes API server audit logs or server log. The requests do appear in the kubelet or aggregated API server logs, but are indistinguishable from correctly authorized and proxied requests via the Kubernetes API server,” reads the post.

It doesn’t take a whole lot of hacking-nous or access privileges to take advantage of the flaw, either: “In default configurations, all users (authenticated and unauthenticated) are allowed to perform discovery API calls that allow this escalation,” continues the post.

[...] It remains to be seen whether the security flaw has been used to attack any Kubernetes user.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by NotSanguine on Wednesday December 05 2018, @01:32PM (2 children)

    by NotSanguine (285) <{NotSanguine} {at} {SoylentNews.Org}> on Wednesday December 05 2018, @01:32PM (#770053) Homepage Journal

    There was me thinking Kubernetes were an alien race of robotic overlords from a cheesy '50s space opera. Am I now to believe it's just a container system like docker but with a stupid name?

    Believe whatever you like friend, now and/or in the future.

    But remember to heed the wisdom of Bokonon:

    Beware of the man who works hard to learn something, learns it, and finds himself no wiser than before. He is full of murderous resentment of people who are ignorant without having come by their ignorance the hard way.

    --
    No, no, you're not thinking; you're just being logical. --Niels Bohr
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Wednesday December 05 2018, @01:55PM (1 child)

    by Anonymous Coward on Wednesday December 05 2018, @01:55PM (#770065)

    So Kubernetes is like Docker with the addition of a murderous userbase? Got it - Thanks.

    • (Score: 2) by c0lo on Wednesday December 05 2018, @02:09PM

      by c0lo (156) Subscriber Badge on Wednesday December 05 2018, @02:09PM (#770070) Journal

      So Kubernetes is like Docker with the addition of a murderous userbase?

      Hack'em, they worth it.

      --
      https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford