You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
That may leads to malicious one can access the worker node which has deployments of Kubean, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster.
Dear kubean maintainers:
I am Nanzi Yang, thank you again for opening this issue. I will try my best to help you to review the permission set and enhance the permission set, other details are sent by an private email:)
Describe the version
version about:
any
Describe the bug
Permissions from https://github.com/kubean-io/kubean/blob/main/charts/kubean/templates/clusterrole.yaml are too loose.
That may leads to malicious one can access the worker node which has deployments of Kubean, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster.
Thanks for the @younaman([email protected])'s reporting
Expected behavior
The Kubean should use accurate verbs and resource types to restrain the permission that granted to the deployment.
The text was updated successfully, but these errors were encountered: