The Privilege escalation issue in role parsing – CVE-2019-11247
We discussed RBAC in detail in Chapter 7, Authentication, Authorization, and Admission Control. Roles and RoleBindings allow users to get the privileges to perform certain actions. These privileges are namespaced. If a user needs a cluster-wide privilege, ClusterRoles and ClusterRolebindings are used. This issue allowed users to make cluster-wide modifications even if their privileges were namespaced. Configurations for admission controllers, such as Open Policy Access, could be modified by users with a namespaced role.
Mitigation strategy
You can use the following strategies to harden your cluster against this issue and issues similar to CVE-2019-11247 that haven't yet been found:
- Avoid wildcards in Roles and RoleBindings: Roles and ClusterRoles should be specific to the resource names, verbs, and API groups. Adding
*
toroles
can allow users to have access to resources that they should not...