Overview

FieldValue
ID1019
NameRead pod logs in a namespace
Risk CategoryInformation Disclosure
Risk LevelMedium
Role TypeRole
API Groupscore
Resourcespods/log
Verbsget
TagsDataExposure InformationDisclosure LogAccess

Description

Grants permission to read logs from pods within a specific namespace. This can expose sensitive application data, credentials, or operational details if present in the logs, leading to information disclosure.

Abuse Scenarios

  1. Retrieve logs from a specific pod within the namespace.
kubectl logs <pod-name> -n <namespace>
# Example: kubectl logs my-web-app-pod -n production
  1. Retrieve logs from a specific container in a pod within the namespace.
kubectl logs <pod-name> -n <namespace> -c <container-name>
# Example: kubectl logs my-app-pod -n default -c init-db