Published Tue, Mar 8th, 2022
Platforms
Unit 42 researchers disclosed several vulnerabilities and attack techniques in GKE Autopilot to Google, the root cause being insufficient verification of allowlisted workload image names. An attacker with permissions to create a pod could have abused these vulnerabilities to (1) escape their pod and compromise the underlying node, (2) escalate privileges and become full cluster administrators, and (3) covertly persist administrative access through backdoors that are completely invisible to cluster operators.
Autopilot
None required
No tracked CVEs
Contributed by https://github.com/0xdabbad00
Entry Status
Finalized
Disclosure Date
Tue, Jun 1st, 2021
Exploitability Period
-
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
-
Discovered by
Yuval Avrahami, Palo Alto
An exposed endpoint in the Azure Automation Service allowed to steal Azure API credentials from other customers