prometheus-operator
v0.1.3
1 Service Accounts
1 Workloads
32 Bindings
3 Critical
18 High
2 Medium
9 Low
Description
Prometheus operator
Overview
Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
---|---|---|---|---|---|---|
prometheus-operator | default | ❌ | — | 32 | 1 | Critical |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 prometheus-operator
Namespace: default
| Automount: ❌
🔑 Permissions (32)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole prometheus-operator | core/configmaps | * | Critical | ClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more) |
ClusterRole prometheus-operator | core/secrets | * | Critical | ClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more) |
ClusterRole prometheus-operator | apps/statefulsets | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole prometheus-operator | monitoring.coreos.com/alertmanagerconfigs | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/alertmanagers | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/alertmanagers/finalizers | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/alertmanagers/status | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/podmonitors | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/probes | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/prometheusagents | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/prometheusagents/finalizers | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/prometheusagents/status | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/prometheuses | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/prometheuses/finalizers | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/prometheuses/status | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/prometheusrules | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/scrapeconfigs | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/servicemonitors | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/thanosrulers | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/thanosrulers/finalizers | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | monitoring.coreos.com/thanosrulers/status | * | High | ClusterWideAccess |
ClusterRole prometheus-operator | authorization.k8s.io/subjectaccessreviews | create | Medium | InformationDisclosure RBACQuery |
ClusterRole prometheus-operator | authentication.k8s.io/tokenreviews | create | Medium | CredentialAccess InformationDisclosure RBACQuery |
ClusterRole prometheus-operator | core/endpoints | create · delete · get · update | Low | |
ClusterRole prometheus-operator | core/events | create · patch | Low | |
ClusterRole prometheus-operator | networking.k8s.io/ingresses | get · list · watch | Low | |
ClusterRole prometheus-operator | core/namespaces | get · list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole prometheus-operator | core/nodes | list · watch | Low | |
ClusterRole prometheus-operator | core/pods | delete · list | Low | |
ClusterRole prometheus-operator | core/services | create · delete · get · update | Low | |
ClusterRole prometheus-operator | core/services/finalizers | create · delete · get · update | Low | |
ClusterRole prometheus-operator | storage.k8s.io/storageclasses | get | Low |
⚠️ Potential Abuse (15)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Create TokenReviews (validate arbitrary tokens)
- Create SubjectAccessReviews (check arbitrary permissions)
- List Namespaces (Cluster Reconnaissance)
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | prometheus-operator | prometheus-operator | quay.io/prometheus-operator/prometheus-operator:v0.77.1 |