Overview

FieldValue
ID1062
NameManage ClusterIssuers (cert-manager.io)
Risk CategorySpoofing
Risk LevelCritical
Role TypeClusterRole
API Groupscert-manager.io
Resourcesclusterissuers
Verbscreate, update, patch, delete
TagsCertificateManagement ElevationOfPrivilege Spoofing Tampering

Description

Allows managing cert-manager ClusterIssuers, which are responsible for signing certificate requests for the entire cluster. Control over ClusterIssuers can enable an attacker to issue arbitrary certificates, potentially for privileged identities or domains, leading to spoofing, tampering, and privilege escalation.

Abuse Scenarios

  1. Create a new ClusterIssuer that can sign arbitrary certificates.
kubectl create -f - <<EOF
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
  name: malicious-ca
spec:
  selfSigned: {}
EOF
# Example: kubectl create -f - <<EOF ... EOF
  1. Delete a critical ClusterIssuer, preventing certificate issuance.
kubectl delete clusterissuer <clusterissuer-name>
# Example: kubectl delete clusterissuer letsencrypt-prod