Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chaosblade-operator Helm Chart: Unnecessary RBAC permissions #246

Open
Yseona opened this issue May 26, 2024 · 0 comments
Open

chaosblade-operator Helm Chart: Unnecessary RBAC permissions #246

Yseona opened this issue May 26, 2024 · 0 comments

Comments

@Yseona
Copy link

Yseona commented May 26, 2024

Description

The bug is that the Deployment chaosblade-operator in the charts has too much RBAC permission than it needs. The service account of chaosblade-operator is bound to a clusterrole (rbac.yaml) with the following permissions:

  • create/delete/patch/update verb of the deployments/daemonsets/pods resource (ClusterRole)

After reading the source code of chaosblade-operator, I didn't find any Kubernetes API usages using these permissions. Besides, some of these unused permissions may have potential risks. For example, if a malicious user gains control of a Kubernetes node running a chaosblade-operator pod, they can use the "create deployment" permission to create privileged containers with malicious container images.

Therefore, these permissions should be rechecked to determine if they are truly unnecessary. If they are, the issue should be fixed by removing the unnecessary permissions or or other feasible methods.

How to reproduce it

Use the helm chart with default values.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant