Conversation

share this with your favorite pro-cloud, k8s loving, docker fanatics who openly condescend to sysadmins and security people, boasting about how they never need to do networking, sysadmin or security because they think someone else does it all for them

do not remind them that all those precious env vars in their k8s cluster that would give an attacker full control of everything are sitting in the container hosting grafana, and because they hate networking and firewalls, this is all public

1
2
0

just give them the screenshot and see what they do

0
0
0

@cR0w cool. wheres your k8s server? i wanna show you something.

1
0
0

@cR0w but dont be too worried im sure itll be fine

1
0
0
@cR0w @Viss Are there any reports about itw exploitation? Asking for https://github.com/v-p-b/xss-reflections
1
1
0

@Viss @cR0w How many teams run Grafana with admin:admin, though?

1
0
0

@schrotthaufen @cR0w the ones ive found are either public/noauth or some kinda shared admin cred. but if you can read env vars out of the container its better than coin toss odds you can take over the whole cluster.

0
0
0

@cR0w @schrotthaufen no its literally what i pointed out up front

0
0
0

@cR0w @schrotthaufen this cve is a gateway, a one-shot silver bullet to an entire k8s cluster takeover.

0
0
0