Kubernetes telemetry feature fully compromises clusters

This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).

A security researcher discovered that Kubernetes' nodes/proxy GET call, commonly used by monitoring tools, can be exploited to execute privileged commands and fully compromise clusters without leaving audit trails. The Kubernetes team classified this as intended behavior rather than a bug, with no CVE issued. The vulnerability

4m read time From thenewstack.io
Post cover image
Table of contents
Working as intendedHow to bring down a Kubernetes clusterPrecautions to take?

Sort: