KubeDojo

Privilege Escalation Paths

AK
by Alexis Kinsella··17 min read
Privilege Escalation Paths

A monitoring service account with nodes/proxy GET shouldn't be able to exec into every pod in the cluster. That permission looks read-only. But Kubernetes authorizes WebSocket exec requests using the GET verb, so that single "read-only" permission is a direct path to cluster-wide code execution.

This is the core pattern of privilege escalation in Kubernetes: the gap between what a permission appears to grant and what it actually enables. Across RBAC verbs, pod configurations, and node-level credentials, attackers exploit these gaps to move from limited access to cluster-admin.

Sign in to access this lesson

Create a free account or sign in to enroll in the KCSA — Kubernetes and Cloud Native Security Associate course and access all 39 lessons.

KCSA — Kubernetes and Cloud Native Security Associate

39 lessons

Browse the full course curriculum →