Overview

FieldValue
ID1068
NameManage ServiceAccounts in a namespace
Risk CategoryElevation of Privilege
Risk LevelMedium
Role TypeRole
API Groupscore
Resourcesserviceaccounts
Verbscreate, update, patch, delete
TagsIdentityManagement PotentialPrivilegeEscalation Tampering

Description

Allows creating, updating, or deleting ServiceAccounts within a specific namespace. This can be used to create SAs within the namespace, which could then be bound to roles for privilege escalation within or from that namespace.

Abuse Scenarios

  1. Create a new ServiceAccount within the namespace.
kubectl create serviceaccount <new-sa-name> -n <namespace>
# Example: kubectl create serviceaccount dev-backdoor-sa -n development
  1. Delete an existing ServiceAccount within the namespace.
kubectl delete serviceaccount <serviceaccount-name> -n <namespace>
# Example: kubectl delete serviceaccount my-app-sa -n production