hivemq-platform-operator
v0.2.16
1 Service Accounts
1 Workloads
16 Bindings
6 Critical
3 High
3 Medium
4 Low
Description
HiveMQ Platform Operator Helm Chart (new)
Overview
Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
---|---|---|---|---|---|---|
hivemq-platform-operator-hivemq-platform-operator | default | ❌ | — | 16 | 1 | Critical |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 hivemq-platform-operator-hivemq-platform-operator
Namespace: default
| Automount: ❌
🔑 Permissions (16)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | core/configmaps | create · delete · get · list · patch · update · watch | Critical | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | core/pods | create · delete · get · list · patch · update · watch | Critical | LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+1 more) |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | core/pods/exec | create · get · watch | Critical | ClusterWidePodExec CodeExecution ElevationOfPrivilege LateralMovement PodExec (+1 more) |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | core/secrets | create · delete · get · list · patch · update · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure Persistence (+4 more) |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | apps/statefulsets | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | rbac.authorization.k8s.io/rolebindings | create · delete · get · list · patch · update · watch | High | BindingToPrivilegedRole InformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery (+1 more) |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | rbac.authorization.k8s.io/roles | create · delete · get · list · patch · update · watch | High | InformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery Reconnaissance |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | core/serviceaccounts | create · delete · get · list · patch · update · watch | High | IdentityManagement PotentialPrivilegeEscalation Tampering |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | rbac.authorization.k8s.io/clusterrolebindings | get · list · watch | Medium | InformationDisclosure RBACQuery Reconnaissance |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | rbac.authorization.k8s.io/clusterroles | get · list · watch | Medium | InformationDisclosure RBACQuery Reconnaissance |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | core/events | create · delete · get · list · patch · update · watch | Medium | InformationDisclosure OperationalData Reconnaissance |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | apiextensions.k8s.io/customresourcedefinitions | create · get · list · patch · update · watch | Low | |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | hivemq.com/hivemq-platforms | create · delete · get · list · patch · update · watch | Low | |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | hivemq.com/hivemq-platforms/finalizers | create · delete · get · list · patch · update · watch | Low | |
ClusterRole hivemq-platform-operator-role-hivemq-platform-operator | hivemq.com/hivemq-platforms/status | create · delete · get · list · patch · update · watch | Low |
⚠️ Potential Abuse (25)
The following security risks were found based on the above permissions:
- Cluster-wide pod exec
- Namespaced pod exec
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage Roles in a namespace (create, update, patch, delete)
- Manage RoleBindings in a namespace (create, update, patch, delete)
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Manage ServiceAccounts cluster-wide
- Manage ServiceAccounts in a namespace
- Read events cluster-wide
- Manage Services cluster-wide
- Manage Services in a namespace
- Read RBAC configuration cluster-wide
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | hivemq-hivemq-platform-operator | hivemq-platform-operator | docker.io/hivemq/hivemq-platform-operator:1.7.1 |