Description
HiveMQ Operator (legacy)
Overview
Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
---|---|---|---|---|---|---|
hivemq-operator-grafana | default | ❌ | — | 2 | 3 | Critical |
hivemq-operator-kube-prome-operator | default | ❌ | — | 21 | 1 | Critical |
hivemq-operator-operator | default | ❌ | — | 25 | 1 | Critical |
hivemq-operator-kube-state-metrics | default | ❌ | — | 31 | 1 | Medium |
hivemq-operator-admission | default | ❌ | — | 3 | 2 | Low |
hivemq-operator-kube-prome-admission | default | ❌ | — | 3 | 2 | Low |
hivemq-operator-kube-prome-prometheus | default | ❌ | — | 6 | 0 | Low |
hivemq-operator-grafana-test | default | ❌ | — | 0 | 1 | — |
hivemq-operator-hivemq | default | ❌ | — | 0 | 0 | — |
hivemq-operator-kube-prome-alertmanager | default | ❌ | — | 0 | 0 | — |
hivemq-operator-prometheus-node-exporter | default | ❌ | — | 0 | 1 | — |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 hivemq-operator-operator
Namespace: default
| Automount: ❌
🔑 Permissions (25)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole hivemq-operator-operator | core/configmaps | create · delete · get · list · patch · update · watch | Critical | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole hivemq-operator-operator | apiextensions.k8s.io/customresourcedefinitions | create · delete · get · list · patch · update | Critical | CRDManipulation PotentialPrivilegeEscalation Tampering |
ClusterRole hivemq-operator-operator | apps/daemonsets | create · delete · get · list · patch · update · watch | Critical | NodeAccess Persistence PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole hivemq-operator-operator | apps/deployments | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole hivemq-operator-operator | core/pods | create · delete · get · list · patch · update · watch | Critical | LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+1 more) |
ClusterRole hivemq-operator-operator | core/pods/attach | create · delete · get · list · patch · update · watch | Critical | ClusterWidePodAttach CodeExecution ElevationOfPrivilege LateralMovement PodAttach (+1 more) |
ClusterRole hivemq-operator-operator | core/pods/exec | create · delete · get · list · patch · update · watch | Critical | ClusterWidePodExec CodeExecution ElevationOfPrivilege LateralMovement PodExec (+1 more) |
ClusterRole hivemq-operator-operator | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole hivemq-operator-operator | apps/statefulsets | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole hivemq-operator-operator | admissionregistration.k8s.io/validatingwebhookconfigurations | create · delete · get · list · patch · update · watch | Critical | DenialOfService InformationDisclosure Reconnaissance Tampering WebhookManipulation (+1 more) |
ClusterRole hivemq-operator-operator | core/pods/portforward | create · delete · get · list · patch · update · watch | High | ClusterWidePodPortForward LateralMovement NetworkManipulation PodPortForward |
ClusterRole hivemq-operator-operator | apiextensions.k8s.io/customresourcedefinitions/finalizers | create · delete · get · list · patch · update | Low | |
ClusterRole hivemq-operator-operator | extensions/daemonsets | create · delete · get · list · patch · update · watch | Low | |
ClusterRole hivemq-operator-operator | extensions/deployments | create · delete · get · list · patch · update · watch | Low | |
ClusterRole hivemq-operator-operator | core/events | create · delete · get · patch · update | Low | |
ClusterRole hivemq-operator-operator | hivemq.com/hivemq-clusters | create · delete · get · list · patch · update · watch | Low | |
ClusterRole hivemq-operator-operator | hivemq.com/hivemq-clusters/finalizers | create · delete · get · list · patch · update · watch | Low | |
ClusterRole hivemq-operator-operator | hivemq.com/hivemq-clusters/scale | create · delete · get · list · patch · update · watch | Low | |
ClusterRole hivemq-operator-operator | hivemq.com/hivemq-clusters/status | create · delete · get · list · patch · update · watch | Low | |
ClusterRole hivemq-operator-operator | core/persistentvolumeclaims | create · delete · get · patch · update | Low | |
ClusterRole hivemq-operator-operator | core/pods/proxy | create · delete · get · list · patch · update · watch | Low | |
ClusterRole hivemq-operator-operator | core/secrets | list | Low | |
ClusterRole hivemq-operator-operator | monitoring.coreos.com/servicemonitors | create · delete · get · list · patch · update · watch | Low | |
ClusterRole hivemq-operator-operator | core/services/proxy | create · delete · get · list · patch · update · watch | Low | |
ClusterRole hivemq-operator-operator | extensions/statefulsets | create · delete · get · list · patch · update · watch | Low |
⚠️ Potential Abuse (26)
The following security risks were found based on the above permissions:
- Cluster-wide pod exec
- Namespaced pod exec
- Cluster-wide pod attach
- Namespaced pod attach
- Cluster-wide pod port-forward
- Namespaced pod port-forward
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Manage DaemonSets cluster-wide (runs on all nodes, high impact)
- Manage DaemonSets in a namespace (runs on nodes, high impact)
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Manage ValidatingWebhookConfigurations
- Manage CustomResourceDefinitions
- Manage Services cluster-wide
- Manage Services in a namespace
- List ValidatingWebhookConfigurations (Reconnaissance)
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | hivemq-operator-operator | operator | hivemq/hivemq-operator:4.7.10 |
🤖 hivemq-operator-kube-prome-operator
Namespace: default
| Automount: ❌
🔑 Permissions (21)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole hivemq-operator-kube-prome-operator | core/configmaps | * | Critical | ClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more) |
ClusterRole hivemq-operator-kube-prome-operator | core/secrets | * | Critical | ClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more) |
ClusterRole hivemq-operator-kube-prome-operator | apps/statefulsets | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole hivemq-operator-kube-prome-operator | monitoring.coreos.com/alertmanagerconfigs | * | High | ClusterWideAccess |
ClusterRole hivemq-operator-kube-prome-operator | monitoring.coreos.com/alertmanagers | * | High | ClusterWideAccess |
ClusterRole hivemq-operator-kube-prome-operator | monitoring.coreos.com/alertmanagers/finalizers | * | High | ClusterWideAccess |
ClusterRole hivemq-operator-kube-prome-operator | monitoring.coreos.com/podmonitors | * | High | ClusterWideAccess |
ClusterRole hivemq-operator-kube-prome-operator | monitoring.coreos.com/probes | * | High | ClusterWideAccess |
ClusterRole hivemq-operator-kube-prome-operator | monitoring.coreos.com/prometheuses | * | High | ClusterWideAccess |
ClusterRole hivemq-operator-kube-prome-operator | monitoring.coreos.com/prometheuses/finalizers | * | High | ClusterWideAccess |
ClusterRole hivemq-operator-kube-prome-operator | monitoring.coreos.com/prometheusrules | * | High | ClusterWideAccess |
ClusterRole hivemq-operator-kube-prome-operator | monitoring.coreos.com/servicemonitors | * | High | ClusterWideAccess |
ClusterRole hivemq-operator-kube-prome-operator | monitoring.coreos.com/thanosrulers | * | High | ClusterWideAccess |
ClusterRole hivemq-operator-kube-prome-operator | monitoring.coreos.com/thanosrulers/finalizers | * | High | ClusterWideAccess |
ClusterRole hivemq-operator-kube-prome-operator | core/endpoints | create · delete · get · update | Low | |
ClusterRole hivemq-operator-kube-prome-operator | networking.k8s.io/ingresses | get · list · watch | Low | |
ClusterRole hivemq-operator-kube-prome-operator | core/namespaces | get · list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole hivemq-operator-kube-prome-operator | core/nodes | list · watch | Low | |
ClusterRole hivemq-operator-kube-prome-operator | core/pods | delete · list | Low | |
ClusterRole hivemq-operator-kube-prome-operator | core/services | create · delete · get · update | Low | |
ClusterRole hivemq-operator-kube-prome-operator | core/services/finalizers | create · delete · get · update | Low |
⚠️ Potential Abuse (13)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- List Namespaces (Cluster Reconnaissance)
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | hivemq-operator-kube-prome-operator | kube-prometheus-stack | quay.io/prometheus-operator/prometheus-operator:v0.53.1 |
🤖 hivemq-operator-grafana
Namespace: default
| Automount: ❌
🔑 Permissions (2)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole hivemq-operator-grafana-clusterrole | core/secrets | get · list · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess |
ClusterRole hivemq-operator-grafana-clusterrole | core/configmaps | get · list · watch | High | ConfigMapAccess DataExposure InformationDisclosure |
⚠️ Potential Abuse (5)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
📦 Workloads (3)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | hivemq-operator-grafana | grafana | grafana/grafana:8.3.4 |
Deployment | hivemq-operator-grafana | grafana-sc-dashboard | quay.io/kiwigrid/k8s-sidecar:1.15.1 |
Deployment | hivemq-operator-grafana | grafana-sc-datasources | quay.io/kiwigrid/k8s-sidecar:1.15.1 |
🤖 hivemq-operator-kube-state-metrics
Namespace: default
| Automount: ❌
🔑 Permissions (31)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole hivemq-operator-kube-state-metrics | admissionregistration.k8s.io/mutatingwebhookconfigurations | list · watch | Medium | InformationDisclosure Reconnaissance WebhookReconnaissance |
ClusterRole hivemq-operator-kube-state-metrics | admissionregistration.k8s.io/validatingwebhookconfigurations | list · watch | Medium | InformationDisclosure Reconnaissance WebhookReconnaissance |
ClusterRole hivemq-operator-kube-state-metrics | certificates.k8s.io/certificatesigningrequests | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | core/configmaps | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | batch/cronjobs | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | apps/daemonsets | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | extensions/daemonsets | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | apps/deployments | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | extensions/deployments | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | core/endpoints | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | autoscaling/horizontalpodautoscalers | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | extensions/ingresses | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | networking.k8s.io/ingresses | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | batch/jobs | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | core/limitranges | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | core/namespaces | list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole hivemq-operator-kube-state-metrics | networking.k8s.io/networkpolicies | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | core/nodes | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | core/persistentvolumeclaims | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | core/persistentvolumes | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | policy/poddisruptionbudgets | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | core/pods | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | apps/replicasets | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | extensions/replicasets | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | core/replicationcontrollers | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | core/resourcequotas | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | core/secrets | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | core/services | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | apps/statefulsets | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | storage.k8s.io/storageclasses | list · watch | Low | |
ClusterRole hivemq-operator-kube-state-metrics | storage.k8s.io/volumeattachments | list · watch | Low |
⚠️ Potential Abuse (4)
The following security risks were found based on the above permissions:
- List Namespaces (Cluster Reconnaissance)
- List ValidatingWebhookConfigurations (Reconnaissance)
- List MutatingWebhookConfigurations (Reconnaissance)
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | hivemq-operator-kube-state-metrics | kube-state-metrics | k8s.gcr.io/kube-state-metrics/kube-state-metrics:v2.3.0 |
🤖 hivemq-operator-kube-prome-prometheus
Namespace: default
| Automount: ❌
🔑 Permissions (6)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole hivemq-operator-kube-prome-prometheus | core/endpoints | get · list · watch | Low | |
ClusterRole hivemq-operator-kube-prome-prometheus | networking.k8s.io/ingresses | get · list · watch | Low | |
ClusterRole hivemq-operator-kube-prome-prometheus | core/nodes | get · list · watch | Low | |
ClusterRole hivemq-operator-kube-prome-prometheus | core/nodes/metrics | get · list · watch | Low | |
ClusterRole hivemq-operator-kube-prome-prometheus | core/pods | get · list · watch | Low | |
ClusterRole hivemq-operator-kube-prome-prometheus | core/services | get · list · watch | Low |
⚠️ Potential Abuse (1)
The following security risks were found based on the above permissions:
📦 Workloads (0)
No workloads use this ServiceAccount.
🤖 hivemq-operator-admission
Namespace: default
| Automount: ❌
🔑 Permissions (3)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole hivemq-operator-admission | admissionregistration.k8s.io/mutatingwebhookconfigurations | get · update | Low | |
Role hivemq-operator-admission | core/secrets | create · get | Low | |
ClusterRole hivemq-operator-admission | admissionregistration.k8s.io/validatingwebhookconfigurations | get · update | Low |
⚠️ Potential Abuse (1)
The following security risks were found based on the above permissions:
📦 Workloads (2)
Kind | Name | Container | Image |
---|---|---|---|
Job | hivemq-operator-admission-create | create | registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.1.1 |
Job | hivemq-operator-admission-patch | patch | registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.1.1 |
🤖 hivemq-operator-kube-prome-admission
Namespace: default
| Automount: ❌
🔑 Permissions (3)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole hivemq-operator-kube-prome-admission | admissionregistration.k8s.io/mutatingwebhookconfigurations | get · update | Low | |
Role hivemq-operator-kube-prome-admission | core/secrets | create · get | Low | |
ClusterRole hivemq-operator-kube-prome-admission | admissionregistration.k8s.io/validatingwebhookconfigurations | get · update | Low |
⚠️ Potential Abuse (1)
The following security risks were found based on the above permissions:
📦 Workloads (2)
Kind | Name | Container | Image |
---|---|---|---|
Job | hivemq-operator-kube-prome-admission-create | create | k8s.gcr.io/ingress-nginx/kube-webhook-certgen:v1.0@sha256:f3b6b39a6062328c095337b4cadcefd1612348fdd5190b1dcbcb9b9e90bd8068 |
Job | hivemq-operator-kube-prome-admission-patch | patch | k8s.gcr.io/ingress-nginx/kube-webhook-certgen:v1.0@sha256:f3b6b39a6062328c095337b4cadcefd1612348fdd5190b1dcbcb9b9e90bd8068 |
🤖 hivemq-operator-grafana-test
Namespace: default
| Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Pod | hivemq-operator-grafana-test | hivemq-operator-test | bats/bats:v1.4.1 |
🤖 hivemq-operator-hivemq
Namespace: default
| Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (0)
No workloads use this ServiceAccount.
🤖 hivemq-operator-kube-prome-alertmanager
Namespace: default
| Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (0)
No workloads use this ServiceAccount.
🤖 hivemq-operator-prometheus-node-exporter
Namespace: default
| Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
DaemonSet | hivemq-operator-prometheus-node-exporter | node-exporter | quay.io/prometheus/node-exporter:v1.3.1 |