TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Privilege escalation through Kubernetes dashboard

67 pointsby knoxa2511over 6 years ago

3 comments

pm90over 6 years ago
Its been known for quite sometime to not expose the dashboard. GKE explicitly disables it by default. TESLA's in-house cluster was pwned because their dashboard was publicly accessible etc.
评论 #18881856 未加载
评论 #18881912 未加载
评论 #18881330 未加载
zarothover 6 years ago
Hard to call this “privilege escalation” if I’m reading this correctly?<p>It’s like a firewall default policy of ALLOW and complaining that packets are getting through.<p>There was a literal “Skip” button on the login page and the default account was granted permission to read certificate private keys. Did I get that right?
omeid2over 6 years ago
I am not surprised, in the general sense that someone has found a security bug in a large and complex piece of software. This is basically another good example of why your control plane should be only accessible through a vpn&#x2F;bastion.