Kubernetes Alert: Security Flaw Could Enable Remote Hacking

Cloud Security , Governance , Patch Management

Patch Container-Orchestration System Now or Risk Serious Consequences

Kubernetes Alert: Security Flaw Could Enable Remote Hacking
Excerpt from Red Hat’s video explaining the Kubernetes privilege escalation flaw.

A severe vulnerability in Kubernetes, the popular, open-source software for managing Linux applications deployed within containers, could allow an attacker to remotely steal data or crash production applications.

See Also: Live Webinar | Levers of Human Deception: The Science and Methodology Behind Social Engineering

That warning, sounded by Kubernetes expert Darren Shepherd, marks one of the first serious problems to be seen with Kubernetes, which was first developed by Google and then turned into an open-source project in 2014 (see Protecting Containers From Cyberattacks).

On Monday, Red Hat and Microsoft said they’ve been taking steps to address the vulnerability, CVE-2018-1002105, which they say poses a “critical” risk.

Microsoft says its Azure Kubernetes Service “has patched all affected clusters by overriding the default Kubernetes configuration to remove unauthenticated access to the entrypoints [Kubernetes commands] that exposed the vulnerability.”

Red Hat says its Kubernetes-based services, including its OpenShift Container Platform, OpenShift Online and OpenShift Dedicated, are affected by the flaw. Red Hat, which was acquired by IBM in October for $34 billion, has issued patches.

In an explanation video, Red Hat says patches will be automatically installed if administrations have auto-updates enabled. Otherwise, administrations should immediately install patches manually.

“The privilege escalation flaw makes it possible for a malicious user to gain full administrator privileges on any computer node in a Kubernetes pod,” according to the Red Hat video. “Not only can this user potentially steal sensitive data or inject malicious code, but the user can also bring down production applications and services from within an organization’s firewall.”

Exploits: Difficult To Detect

The vulnerability can be exploited by sending a specially crafted request to the Kubernetes API and then onto a backend server, writes Jordan Liggitt, a staff software engineer at Google, in a post on Github.

After sending such a request, an attacker could then send “arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection,” he says.

“Because the unauthorized requests are made over an established connection, they do not appear in the Kubernetes API server audit logs or server log.”
— Jordan Liggitt, Google

Liggitt writes that “an API call to any aggregated API server endpoint can be escalated to perform any API request against that aggregated API server, as long as that aggregated API server is directly accessible from the Kubernetes API server’s network.” In the default configuration, any user – whether authenticated or not – can perform discovery API calls that allow for escalation, he says.

Unfortunately, there’s no simple way to figure out whether the vulnerability has been exploited. “Because the unauthorized requests are made over an established connection, they do not appear in the Kubernetes API server audit logs or server log,” he writes. “The requests do appear in the kubelet or aggregated API server logs, but are indistinguishable from correctly authorized and proxied requests via the Kubernetes API server.”

Red Hat: This Is ‘A Big Deal’

Ashesh Badani, Red Hat’s general manager of cloud platforms, describes the vulnerability as “a big deal,” in a blog post.

The vulnerability affects 3.x version of Red Hat’s OpenShift Container Platform, allowing for the compromise of “pods,” or a single instance of an app running in a container that runs on normal user privileges on a node, according to Red Hat’s advisory.

Access gained by an attacker using the vulnerability includes all secrets, pods, environment variables, running pod/container processes, and persistent volumes, Red Hat warns.

On Openshift Container Platform 3.6 and higher, “this vulnerability allows cluster-admin level access to any API hosted by an aggregated API server,” it says.

“This includes the ‘metrics-service’ and ‘servicecatalog’ as possible targets. Cluster-admin level access to the service catalog allows creation of brokered services by an unauthenticated user with escalated privileges in any namespace and on any node,” according to the advisory. “This could allow an attacker to deploy malicious code, or alter existing brokered services.”