Kubesploit – Telegram
Kubesploit
1.96K subscribers
822 photos
128 videos
1.6K links
News and links on Kubernetes security curated by the @Learnk8s team
Website: https://kubesploit.io/
Download Telegram
A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, in the way it parsed kubeconfig files.
Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).

More: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0759
Argo CD is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD's repo-server.

More: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24730
Malicious Docker containers are a relatively new form of attack, taking advantage of an exposed Docker API or vulnerable host to do their evil plotting.​​ In this article, you'll walk through the triage of a malicious image.

More: https://sysdig.com/blog/triaging-malicious-docker-container
A vulnerability in CRI-O could allow for attackers who are able to create pods in a Kubernetes or OpenShift cluster to break out to the underlying cluster node, effectively escalating their privileges.

More: https://blog.aquasec.com/cve-2022-0811-cri-o-vulnerability
Forwarded from Kube Architect
In this post, you'll cover:

- High-level best practices you should know to secure your workflows.
- The various components that make up Argo, and how to secure those components.
- Dive into operating and using Argo securely.

More: https://blog.argoproj.io/practical-argo-workflows-hardening-dd8429acc1ce
In this tutorial, you will learn the authentication, authorization, logging, and auditing of a Kubernetes cluster. Specifically, you will discuss some of the best practices in AWS EKS.

More: https://dev.to/gitguardian/kubernetes-hardening-tutorial-part-3-authn-authz-logging-auditing-3fec
Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows users with Credentials/Create permission to read arbitrary files on the Jenkins controller.

More: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27208
In this article, you will learn how the tools in the OpenShift Platform Plus bundle help an organization maintain and secure network traffic flows in multi cluster OpenShift environments.

More: https://michaelkotelnikov.medium.com/maintaining-network-traffic-compliance-in-multi-cluster-openshift-environments-with-openshift-54fe369aa346
Kubernetes audit logs are powerful, but only if enabled and correctly configured. This article will help you get started using audit logs, and show you how to get the most out of them.

More: https://containiq.com/post/kubernetes-audit-logs
Forwarded from LearnKube news
The Kubernetes API server exposes an HTTP API that lets end-users, different parts of your cluster, and external components communicate with one another.

But how is access to the API restricted only to authorized users?

In this article, you will cover:

1. The difference between externally managed and internal identities.
2. How the Kubernetes API server implements different authentication plugins to authenticate users, such as static token, bearer token, X509 certificate, OIDC, etc.
3. How Kubernetes assigns identities for internal users with Service Accounts.
4. The difference between tokens created through Secrets and Service Account tokens created by the Kubelet.
5. How Federated OIDC works and how it can be integrated with a cloud provider such as Amazon Web Services.
6. How to use the Token Review API to verify Service Account tokens' validity within the cluster.

Full article here: https://learnk8s.io/authentication-kubernetes
In this post, you will learn how easily a limited user (such as a developer) can escalate their privileges and become an admin of a cluster which has been set up using kubeadm.

More: https://faun.pub/from-dev-to-admin-an-easy-kubernetes-privilege-escalation-you-should-be-aware-of-the-attack-950e6cf76cac
The Seccomp Agent is receiving seccomp file denoscriptors from container runtimes and handling system calls on behalf of the containers. Its goal is to support different use cases:

- Unprivileged container builds.
- Support of safe mknod.

More: https://github.com/kinvolk/seccompagent
ovn-kubernetes has a flaw that allows a system administrator or privileged attacker to create an egress network policy that bypasses existing ingress policies of other pods, allowing network traffic to access pods that should not be reachable.

More: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0567
Ephemeral containers are temp containers that can be attached after a Pod is created.

But what happens when you use them on a hardened cluster?

The answer is not so obvious as OPA, Kyverno, PSPs, etc. will do their best to (rightly) prevent execution.

More: https://xenitab.github.io/blog/2022/04/12/ephemeral-container-security
In Kubernetes, there are two aspects to security: cluster security and application security. In this post, you'll explore how to secure ‌Kubernetes deployments and applications in general.

More: https://armosec.io/blog/secure-kubernetes-deployment
Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously.

More: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24829
Forwarded from LearnKube news
There are several ways to create a data fetching mechanism for the Open Policy Agent - each of them has its pros and cons.
In this guide, you will compare and decide which one is the best for you.

More: https://dev.to/permit_io/load-external-data-into-opa-the-good-the-bad-and-the-ugly-26lc
Vulnscan is a suite of reporting and analysis tools built on top of Anchore's syft utility (to create software bills of material) and Grype utility (to scan those SBOMs for vulnerabilities). This suite is designed to be run on a kubernetes cluster.

More: https://github.com/davideshay/vulnscan#readme
Forwarded from LearnKube news
undefined

You can sign up here: https://learnk8s.io/online-advanced-july-2022