Overview

FieldValue
ID1076
NameManage Services in a namespace
Risk CategoryNetworkManipulation
Risk LevelHigh
Role TypeRole
API Groupscore
Resourcesservices
Verbscreate, update, patch, delete
TagsDenialOfService NetworkManipulation ServiceExposure Tampering

Description

Permits creating, updating, or deleting Services within a specific namespace. This can lead to unintended exposure of applications, traffic misdirection, or denial of service within that namespace.

Abuse Scenarios

  1. Create a new NodePort Service to expose an internal application in the namespace.
kubectl create -n <namespace> -f - <<EOF
apiVersion: v1
kind: Service
metadata:
  name: exposed-app-nodeport
spec:
  selector:
    app: <internal-app-label>
  ports:
    - protocol: TCP
      port: 80
      targetPort: 8080
  type: NodePort
EOF
# Example: kubectl create -n default -f - <<EOF ... EOF
  1. Delete a critical Service within the namespace, causing unavailability.
kubectl delete service <service-name> -n <namespace>
# Example: kubectl delete service my-web-app -n production