Description

KubeStash, Kubernetes native backup operator by AppsCode

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
kubestash-operatordefault472Critical
kubestash-operator-cleanerdefault61High

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 kubestash-operator

Namespace: default  |  Automount:

🔑 Permissions (47)

RoleResourceVerbsRiskTags
ClusterRole kubestash-operatorrbac.authorization.k8s.io/clusterrolebindingscreate · delete · get · list · patch · update · watchCriticalBindingToPrivilegedRole ClusterAdminAccess InformationDisclosure PrivilegeEscalation RBACManipulation (+2 more)
ClusterRole kubestash-operatorrbac.authorization.k8s.io/clusterrolescreate · delete · get · list · patch · update · watchCriticalClusterAdminAccess InformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery (+1 more)
ClusterRole kubestash-operatorbatch/cronjobscreate · delete · get · list · patch · update · watchCriticalPersistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle
ClusterRole kubestash-operatorbatch/jobscreate · delete · get · list · patch · update · watchCriticalPotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle
Role kubestash-operator-leader-electioncoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService Tampering
ClusterRole kubestash-operatoradmissionregistration.k8s.io/mutatingwebhookconfigurations*CriticalClusterWideAccess DenialOfService InformationDisclosure PrivilegeEscalation Reconnaissance (+4 more)
ClusterRole kubestash-operatorcore/pods/execcreateCriticalClusterWidePodExec CodeExecution ElevationOfPrivilege LateralMovement PodExec (+1 more)
ClusterRole kubestash-operatorcore/secretscreate · delete · get · list · patch · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole kubestash-operatoradmissionregistration.k8s.io/validatingwebhookconfigurations*CriticalClusterWideAccess DenialOfService InformationDisclosure Reconnaissance Tampering (+3 more)
ClusterRole kubestash-operatoraddons.kubestash.com/**HighClusterWideAccess WildcardPermission
ClusterRole kubestash-operatorappcatalog.appscode.com/*get · list · watchHighClusterWideAccess WildcardPermission
ClusterRole kubestash-operatorconfig.kubestash.com/**HighClusterWideAccess WildcardPermission
ClusterRole kubestash-operatorcore.kubestash.com/**HighClusterWideAccess WildcardPermission
ClusterRole kubestash-operatorkubedb.com/**HighClusterWideAccess WildcardPermission
ClusterRole kubestash-operatorsnapshot.storage.k8s.io/**HighClusterWideAccess WildcardPermission
ClusterRole kubestash-operatorstorage.kubestash.com/**HighClusterWideAccess WildcardPermission
Role kubestash-operator-leader-electioncore/configmapscreate · delete · get · list · patch · update · watchHighConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
ClusterRole kubestash-operatorrbac.authorization.k8s.io/rolebindingscreate · delete · get · list · patch · update · watchHighBindingToPrivilegedRole InformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery (+1 more)
ClusterRole kubestash-operatorrbac.authorization.k8s.io/rolescreate · delete · get · list · patch · update · watchHighInformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery Reconnaissance
ClusterRole kubestash-operatorcore/serviceaccountscreate · delete · get · list · patch · update · watchHighIdentityManagement PotentialPrivilegeEscalation Tampering
ClusterRole kubestash-operator-auth-proxyauthorization.k8s.io/subjectaccessreviewscreateMediumInformationDisclosure RBACQuery
ClusterRole kubestash-operator-auth-proxyauthentication.k8s.io/tokenreviewscreateMediumCredentialAccess InformationDisclosure RBACQuery
ClusterRole appscode:license-readerapiregistration.k8s.io/apiservicesgetLow
ClusterRole kubestash-operatorappcatalog.appscode.com/appbindingsget · list · watchLow
ClusterRole kubestash-operatorapiextensions.k8s.io/customresourcedefinitionscreate · get · patch · updateLow
ClusterRole kubestash-operatorapps/daemonsetsget · list · watchLow
ClusterRole appscode:license-checkerapps/deploymentsgetLow
ClusterRole kubestash-operatorapps/deploymentscreate · get · list · patch · update · watchLow
ClusterRole kubestash-operatorcatalog.kubedb.com/elasticsearchsget · list · watchLow
ClusterRole kubestash-operatorcore/endpointsget · list · watchLow
ClusterRole appscode:license-checkercore/eventscreate · get · list · patchLow
ClusterRole kubestash-operatorcore/eventscreateLow
Role kubestash-operator-leader-electioncore/eventscreate · patchLow
ClusterRole appscode:license-checkerproxyserver.licenses.appscode.com/licenserequestscreateLow
ClusterRole appscode:license-checkercore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole kubestash-operatorcore/namespacesget · list · patch · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole appscode:license-checkercore/nodesget · list · watchLow
ClusterRole kubestash-operatorcore/persistentvolumeclaimscreate · delete · get · list · patch · update · watchLow
ClusterRole kubestash-operatorcore/persistentvolumescreate · delete · get · list · patch · update · watchLow
ClusterRole appscode:license-checkercore/podsgetLow
ClusterRole kubestash-operatorcore/podsget · list · watchLow
ClusterRole appscode:license-checkerapps/replicasetsgetLow
ClusterRole kubestash-operatorapps/replicasetsget · list · watchLow
ClusterRole kubestash-operatorcore/servicesget · list · watchLow
ClusterRole kubestash-operatorapps/statefulsetsget · list · watchLow
ClusterRole kubestash-operatorstorage.k8s.io/storageclassesget · list · watchLow
ClusterRole kubestash-operatorsnapshot.storage.k8s.io/volumesnapshotsdelete · getLow

⚠️ Potential Abuse (27)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Deploymentkubestash-operatorkube-rbac-proxyghcr.io/appscode/kube-rbac-proxy:v0.11.0
Deploymentkubestash-operatoroperatorghcr.io/kubestash/kubestash:v0.2.2

🤖 kubestash-operator-cleaner

Namespace: default  |  Automount:

🔑 Permissions (6)

RoleResourceVerbsRiskTags
ClusterRole kubestash-operator-cleaneraddons.kubestash.com/*deleteHighClusterWideAccess WildcardPermission
ClusterRole kubestash-operator-cleanercore.kubestash.com/*deleteHighClusterWideAccess WildcardPermission
ClusterRole kubestash-operator-cleanerstorage.kubestash.com/*deleteHighClusterWideAccess WildcardPermission
ClusterRole kubestash-operator-cleanerbatch/jobsdeleteLow
ClusterRole kubestash-operator-cleaneradmissionregistration.k8s.io/mutatingwebhookconfigurationsdeleteLow
ClusterRole kubestash-operator-cleaneradmissionregistration.k8s.io/validatingwebhookconfigurationsdeleteLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Jobkubestash-operator-cleanerbusyboxghcr.io/appscode/kubectl:v1.24