Overview

FieldValue
ID1065
NameManage ETCDSnapshotFiles (k3s.cattle.io)
Risk CategoryInformation Disclosure
Risk LevelCritical
Role TypeClusterRole
API Groupsk3s.cattle.io
Resourcesetcdsnapshotfiles
Verbsget, list, create, update, delete
TagsBackupAccess ClusterAdminAccess CredentialAccess DataExposure Tampering

Description

Grants access to manage ETCD snapshot files, typically in a K3s environment. ETCD snapshots contain the entire state of the Kubernetes cluster, including all secrets, configurations, and resource definitions. Access allows complete data exposure, credential harvesting, and potentially restoring a compromised state or tampering with backups.

Abuse Scenarios

  1. List all ETCD snapshot files.
kubectl get etcdsnapshotfiles
  1. Delete an ETCD snapshot file, potentially hindering recovery or causing data loss.
kubectl delete etcdsnapshotfile <snapshot-file-name>
# Example: kubectl delete etcdsnapshotfile etcd-snapshot-12345