mirror of
https://github.com/aquasecurity/kube-hunter.git
synced 2026-02-14 18:09:56 +00:00
840 B
840 B
vid, title, categories, severity
| vid | title | categories | severity | |
|---|---|---|---|---|
| KHV046 | Exposed Kubelet Cmdline |
|
high |
{{ page.vid }} - {{ page.title }}
Issue description
When the Kubelet is run in debug mode, a Pod running in the cluster is able to access the Kubelet's debug/pprof/cmdline endpoint and examine how the kubelet was executed on the node, specifically the command line flags that were used, which tells the attacker about what capabilities the kubelet has which might be exploited.
Remediation
Disable --enable-debugging-handlers kubelet flag.