Overview

FieldValue
ID1024
NameModify ConfigMaps cluster-wide
Risk CategoryTampering
Risk LevelCritical
Role TypeClusterRole
API Groupscore
Resourcesconfigmaps
Verbscreate, update, patch, delete
TagsConfigMapAccess PotentialPrivilegeEscalation Tampering

Description

Allows creating, updating, patching, or deleting ConfigMaps in any namespace. This enables an attacker to tamper with application configurations across the cluster, potentially leading to misconfigurations, denial of service, or privilege escalation if applications consume malicious configurations.

Abuse Scenarios

  1. Create a new ConfigMap with malicious configuration in any namespace.
kubectl create configmap <new-cm-name> --from-literal=malicious_setting=true -n <namespace>
# Example: kubectl create configmap backdoor-config --from-literal=debug_mode=true -n kube-system
  1. Patch an existing ConfigMap to alter application behavior.
kubectl patch configmap <configmap-name> -n <namespace> --type='json' -p='[{"op": "replace", "path": "/data/<key>", "value": "<new-value>"}]'
# Example: kubectl patch configmap my-app-config -n default --type='json' -p='[{"op": "replace", "path": "/data/log_level", "value": "DEBUG"}]'
  1. Delete a critical ConfigMap, causing application disruption.
kubectl delete configmap <configmap-name> -n <namespace>
# Example: kubectl delete configmap coredns -n kube-system