solr-operator
v0.9.1
4 Service Accounts
4 Workloads
48 Bindings
17 Critical
6 High
4 Medium
21 Low
Description
The Solr Operator enables easy management of Solr resources within Kubernetes.
Overview
Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
---|---|---|---|---|---|---|
solr-operator | default | ❌ | — | 30 | 1 | Critical |
zookeeper-operator | default | ❌ | — | 15 | 1 | Critical |
solr-operator-zookeeper-operator-pre-delete | default | ❌ | — | 1 | 1 | High |
solr-operator-zookeeper-operator-post-install-upgrade | default | ❌ | — | 2 | 1 | Medium |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 solr-operator
Namespace: default
| Automount: ❌
🔑 Permissions (30)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole solr-operator-role | core/configmaps | create · delete · get · list · patch · update · watch | Critical | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole solr-operator-role | apps/deployments | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
Role solr-operator-leader-election-role | coordination.k8s.io/leases | create · delete · get · list · patch · update · watch | Critical | ControlPlaneDisruption CriticalNamespace DenialOfService Tampering |
ClusterRole solr-operator-role | core/pods/exec | create | Critical | ClusterWidePodExec CodeExecution ElevationOfPrivilege LateralMovement PodExec (+1 more) |
ClusterRole solr-operator-role | core/secrets | create · delete · get · list · patch · update · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure Persistence (+4 more) |
ClusterRole solr-operator-role | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole solr-operator-role | apps/statefulsets | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
Role solr-operator-leader-election-role | core/configmaps | create · delete · get · list · patch · update · watch | High | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole solr-operator-role | networking.k8s.io/ingresses | create · delete · get · list · patch · update · watch | High | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole solr-operator-role | policy/poddisruptionbudgets | create · delete · get · list · patch · update · watch | Medium | AvailabilityImpact DenialOfService Tampering |
ClusterRole solr-operator-role | core/configmaps/status | get | Low | |
ClusterRole solr-operator-role | apps/deployments/status | get | Low | |
Role solr-operator-leader-election-role | core/events | create · patch | Low | |
ClusterRole solr-operator-role | networking.k8s.io/ingresses/status | get | Low | |
ClusterRole solr-operator-role | core/persistentvolumeclaims | delete · get · list · watch | Low | |
ClusterRole solr-operator-role | core/pods | delete · get · list · watch | Low | |
ClusterRole solr-operator-role | core/pods/status | get · patch | Low | |
ClusterRole solr-operator-role | core/services/status | get | Low | |
ClusterRole solr-operator-role | solr.apache.org/solrbackups | create · delete · get · list · patch · update · watch | Low | |
ClusterRole solr-operator-role | solr.apache.org/solrbackups/finalizers | update | Low | |
ClusterRole solr-operator-role | solr.apache.org/solrbackups/status | get · patch · update | Low | |
ClusterRole solr-operator-role | solr.apache.org/solrclouds | create · delete · get · list · patch · update · watch | Low | |
ClusterRole solr-operator-role | solr.apache.org/solrclouds/finalizers | update | Low | |
ClusterRole solr-operator-role | solr.apache.org/solrclouds/status | get · patch · update | Low | |
ClusterRole solr-operator-role | solr.apache.org/solrprometheusexporters | create · delete · get · list · patch · update · watch | Low | |
ClusterRole solr-operator-role | solr.apache.org/solrprometheusexporters/finalizers | update | Low | |
ClusterRole solr-operator-role | solr.apache.org/solrprometheusexporters/status | get · patch · update | Low | |
ClusterRole solr-operator-role | apps/statefulsets/status | get | Low | |
ClusterRole solr-operator-role | zookeeper.pravega.io/zookeeperclusters | create · delete · get · list · patch · update · watch | Low | |
ClusterRole solr-operator-role | zookeeper.pravega.io/zookeeperclusters/status | get | Low |
⚠️ Potential Abuse (20)
The following security risks were found based on the above permissions:
- Cluster-wide pod exec
- Namespaced pod exec
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Manage Services cluster-wide
- Manage Services in a namespace
- Manage PodDisruptionBudgets cluster-wide
- Manage Leases in kube-system or kube-node-lease namespace
- Manage Ingresses (Namespace Service Exposure/Traffic Redirection)
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | solr-operator | solr-operator | apache/solr-operator:v0.9.1 |
🤖 zookeeper-operator
Namespace: default
| Automount: ❌
🔑 Permissions (15)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole solr-operator-zookeeper-operator | core/configmaps | * | Critical | ClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more) |
ClusterRole solr-operator-zookeeper-operator | apps/daemonsets | * | Critical | ClusterWideAccess NodeAccess Persistence PrivilegeEscalation Tampering (+2 more) |
ClusterRole solr-operator-zookeeper-operator | apps/deployments | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole solr-operator-zookeeper-operator | core/endpoints | * | Critical | ClusterWideAccess DenialOfService ManInTheMiddle NetworkManipulation Tampering (+2 more) |
ClusterRole solr-operator-zookeeper-operator | core/nodes | * | Critical | ClusterWideAccess DenialOfService NodeAccess PotentialPrivilegeEscalation ResourceDeletion (+2 more) |
ClusterRole solr-operator-zookeeper-operator | core/pods | * | Critical | ClusterWideAccess LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation (+3 more) |
ClusterRole solr-operator-zookeeper-operator | core/secrets | * | Critical | ClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more) |
ClusterRole solr-operator-zookeeper-operator | core/serviceaccounts | * | Critical | ClusterAdminAccess ClusterWideAccess IdentityManagement Impersonation PotentialPrivilegeEscalation (+4 more) |
ClusterRole solr-operator-zookeeper-operator | core/services | * | Critical | ClusterWideAccess DenialOfService NetworkManipulation ServiceExposure Tampering (+1 more) |
ClusterRole solr-operator-zookeeper-operator | apps/statefulsets | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole solr-operator-zookeeper-operator | zookeeper.pravega.io/* | * | High | ClusterWideAccess |
ClusterRole solr-operator-zookeeper-operator | core/persistentvolumeclaims | * | High | ClusterWideAccess |
ClusterRole solr-operator-zookeeper-operator | apps/replicasets | * | High | ClusterWideAccess |
ClusterRole solr-operator-zookeeper-operator | core/events | * | Medium | ClusterWideAccess InformationDisclosure OperationalData Reconnaissance |
ClusterRole solr-operator-zookeeper-operator | policy/poddisruptionbudgets | * | Medium | AvailabilityImpact ClusterWideAccess DenialOfService Tampering |
⚠️ Potential Abuse (30)
The following security risks were found based on the above permissions:
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Modify node configuration (labels, taints)
- Delete nodes
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Manage DaemonSets cluster-wide (runs on all nodes, high impact)
- Manage DaemonSets in a namespace (runs on nodes, high impact)
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Impersonate users, groups, or service accounts (cluster-wide)
- Manage ServiceAccounts cluster-wide
- Manage ServiceAccounts in a namespace
- Read events cluster-wide
- Manage Endpoints or EndpointSlices cluster-wide
- Manage Endpoints or EndpointSlices in a namespace
- Manage Services cluster-wide
- Manage Services in a namespace
- Manage PodDisruptionBudgets cluster-wide
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | solr-operator-zookeeper-operator | solr-operator-zookeeper-operator | pravega/zookeeper-operator:0.2.15 |
🤖 solr-operator-zookeeper-operator-pre-delete
Namespace: default
| Automount: ❌
🔑 Permissions (1)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole solr-operator-zookeeper-operator-pre-delete | zookeeper.pravega.io/* | get · list | High | ClusterWideAccess |
⚠️ Potential Abuse (1)
The following security risks were found based on the above permissions:
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Job | solr-operator-zookeeper-operator-pre-delete | pre-delete-job | lachlanevenson/k8s-kubectl:v1.23.2 |
🤖 solr-operator-zookeeper-operator-post-install-upgrade
Namespace: default
| Automount: ❌
🔑 Permissions (2)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
Role solr-operator-zookeeper-operator-post-install-upgrade | zookeeper.pravega.io/* | get | Medium | NamespaceAdmin NamespaceWideAccess |
Role solr-operator-zookeeper-operator-post-install-upgrade | extensions/deployments | get | Low |
⚠️ Potential Abuse (2)
The following security risks were found based on the above permissions:
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Job | solr-operator-zookeeper-operator-post-install-upgrade | post-install-upgrade-job | lachlanevenson/k8s-kubectl:v1.23.2 |