k8s 漏洞列表
共找到 33 个与 k8s 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2025-1974-k8s: Ingress-Nginx Controller - Unauthenticated Remote Code Execution POC
A security issue was discovered in ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller -
CVE-2025-1974-k8s: Ingress-Nginx Controller - Unauthenticated Remote Code Execution POC
A security issue was discovered in ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller -
k8s-cpu-limits-not-set: CPU limits not set in Deployments POC
Checks for missing CPU limits in Kubernetes Deployments, which can lead to excessive CPU usage and affect other applications -
k8s-cpu-requests-not-set: CPU Requests not set in Deployments POC
Checks for missing CPU requests in Kubernetes Deployments, which can lead to inadequate scheduling and resource allocation. -
k8s-default-namespace-used: Default Namespace Usage in Deployments POC
Checks if Kubernetes Deployments are using the default namespace, which can lead to security risks and mismanagement issues. -
k8s-host-ports-check: Host ports should not be used POC
Checks Kubernetes Deployments to ensure they are not configured to use host ports, which can expose the host to potential security risks. -
k8s-image-pull-policy-always: Image Pull Policy set to Always POC
Ensures that Kubernetes deployments have the image pull policy set to 'Always', which guarantees the most up-to-date version of the image is used. -
k8s-image-tag-not-fixed: Image Tag should be fixed - not latest or blank POC
Checks if Kubernetes Deployment container images are using tags other than 'latest' or blank, which can lead to unstable and unpredictable deployments. -
k8s-liveness-probe-not-configured: Liveness Probe Not Configured in Deployments POC
Checks for missing liveness probes in Kubernetes Deployments, which are essential for managing container health and automatic recovery -
k8s-memory-limits-not-set: Memory limits not set in Deployments POC
Checks for missing memory limits in Kubernetes Deployments, which can lead to resource contention and instability -
k8s-memory-requests-not-set: Memory requests not set in Deployments POC
Checks for missing memory requests in Kubernetes Deployments, which can lead to inefficient scheduling and potential node resource exhaustion. -
k8s-privileged-containers: Privileged Containers Found in Deployments POC
Checks for containers running in privileged mode within Kubernetes Deployments, and now also checks for user privileges and privilege escalation settings. -
k8s-readiness-probe-not-set: Readiness Probes not set in Deployments POC
Checks for missing readiness probes in Kubernetes Deployments, which can lead to traffic being sent to unready containers -
k8s-root-container-admission: Minimize the admission of root containers POC
Checks if any Kubernetes Deployments admit containers that run as root, which can pose a significant security risk. -
k8s-seccomp-profile-set: Set appropriate seccomp profile POC
Checks if the seccomp profile is set to docker/default or runtime/default in Kubernetes Deployments. -
k8s-missing-network-policies: Check for Missing Network Policies in Kubernetes POC
Checks if any network policies are defined across all namespaces in the Kubernetes cluster. -
k8s-netpol-egress-rules: Network policies define egress rules POC
Checks for network policies in Kubernetes that do not define egress rules, which can leave the network exposed to external threats. -
k8s-netpol-namespace: Network Policies specify namespace POC
Checks for Kubernetes Network Policies that do not specify a namespace, which can lead to potential misconfigurations and security issues. -
k8s-network-ingress-rules: Define network ingress rules POC
Checks if Kubernetes network policies define specific ingress rules, which can help secure network communication within the cluster. -
k8s-allow-privilege-escalation-set: Containers run with allowPrivilegeEscalation enabled POC
Checks for containers running with the allowPrivilegeEscalation flag enabled, which can increase security risks by allowing privileges to be escalated -
k8s-containers-share-host-ipc: Containers sharing host IPC namespace POC
Checks if any containers in Kubernetes Pods are configured to share the host's IPC namespace, which can lead to security risks. -
k8s-host-pid-namespace-sharing: Host PID Namespace Sharing POC
Checks if containers in Kubernetes pods share the host's process ID namespace, which can pose a security risk. -
k8s-readonly-fs: Enforce Read-Only Filesystem for Containers POC
Checks for containers that do not use a read-only filesystem, which can prevent malicious write operations at runtime -
k8s-readonly-rootfs: Pods with read-only root filesystem POC
Checks for pods and containers running with a read-only root filesystem to prevent modifications to the filesystem, enhancing security. -
k8s-root-user-id: Pods run with root user ID POC
Checks for pods running with the user ID of the root user, increasing security risks. -
k8s-role-pod-create: Roles that have pod create permissions POC
Checks for roles that have permissions to create pods. -
k8s-enc-prov-conf: Ensure that encryption providers are configured POC
Checks if encryption providers are appropriately configured in Kubernetes, ensuring that data at rest is secured. -
k8s-etcd-cafile-set: Ensure etcd-cafile argument set POC
Checks if the etcd-cafile argument is properly set in the etcd configuration, crucial for secure client connections to etcd. -
k8s-etcd-files-set: Ensure etcd cert and key set POC
Checks if the etcd-certfile and etcd-keyfile arguments are properly set in the etcd server configuration, crucial for secure communication. -
k8s-svc-acct-issuer-set: Checks if service-account-issuer is correctly configured POC
Checks if the service-account-issuer argument is correctly configured in the API server, critical for issuing valid service tokens. -
k8s-svc-acct-key: Ensure service-account-key-file set POC
Checks if the service-account-key-file argument is properly set in the API server configuration, which is critical for validating service account tokens. -
k8s-svc-acct-lookup-set: Ensure service-account-lookup set POC
Checks if the service-account-lookup argument is set to true in the API server configuration, which is essential for verifying service accounts against the stored secrets. -
k8s-tls-config-set: Ensure TLS config appropriately set POC
Checks if the tls-cert-file and tls-private-key-file arguments are properly set in the API server configuration, which is essential for secure communication.