2020-05-20 16:27:31,363 INFO kube_hunter.modules.report.collector Started hunting 2020-05-20 16:27:31,363 INFO kube_hunter.modules.report.collector Discovering Open Kubernetes Services 2020-05-20 16:27:31,366 INFO kube_hunter.modules.report.collector Found vulnerability "Read access to pod's service account token" in Local to Pod (kube-hunter-9vsfb) 2020-05-20 16:27:31,366 INFO kube_hunter.modules.report.collector Found vulnerability "CAP_NET_RAW Enabled" in Local to Pod (kube-hunter-9vsfb) 2020-05-20 16:27:31,367 INFO kube_hunter.modules.report.collector Found vulnerability "Access to pod's secrets" in Local to Pod (kube-hunter-9vsfb) 2020-05-20 16:27:44,223 INFO kube_hunter.modules.report.collector Found open service "API Server" at 10.254.0.1:443 2020-05-20 16:27:44,258 INFO kube_hunter.modules.report.collector Found vulnerability "Access to API using service account token" in 10.254.0.1:443 2020-05-20 16:27:44,278 INFO kube_hunter.modules.report.collector Found vulnerability "K8s Version Disclosure" in 10.254.0.1:443 Nodes +-------------+------------+ | TYPE | LOCATION | +-------------+------------+ | Node/Master | 10.254.0.1 | +-------------+------------+ Detected Services +------------+----------------+----------------------+ | SERVICE | LOCATION | DESCRIPTION | +------------+----------------+----------------------+ | API Server | 10.254.0.1:443 | The API server is in | | | | charge of all | | | | operations on the | | | | cluster. | +------------+----------------+----------------------+ Vulnerabilities For further information about a vulnerability, search its ID in: https://github.com/aquasecurity/kube-hunter/tree/master/docs/_kb +--------+----------------------+----------------------+----------------------+----------------------+----------------------+ | ID | LOCATION | CATEGORY | VULNERABILITY | DESCRIPTION | EVIDENCE | +--------+----------------------+----------------------+----------------------+----------------------+----------------------+ | KHV005 | 10.254.0.1:443 | Information | Access to API using | The API Server port | b'{"kind":"APIVersio | | | | Disclosure | service account | is accessible. | ns","versions":["v1" | | | | | token | Depending on | ... | | | | | | your RBAC settings | | | | | | | this could expose | | | | | | | access to or control | | | | | | | of your cluster. | | +--------+----------------------+----------------------+----------------------+----------------------+----------------------+ | KHV002 | 10.254.0.1:443 | Information | K8s Version | The kubernetes | v1.16.2 | | | | Disclosure | Disclosure | version could be | | | | | | | obtained from the | | | | | | | /version endpoint | | +--------+----------------------+----------------------+----------------------+----------------------+----------------------+ | None | Local to Pod (kube- | Access Risk | CAP_NET_RAW Enabled | CAP_NET_RAW is | | | | hunter-9vsfb) | | | enabled by default | | | | | | | for pods. | | | | | | | If an attacker | | | | | | | manages to | | | | | | | compromise a pod, | | | | | | | they could | | | | | | | potentially take | | | | | | | advantage of this | | | | | | | capability to | | | | | | | perform network | | | | | | | attacks on other | | | | | | | pods running on the | | | | | | | same node | | +--------+----------------------+----------------------+----------------------+----------------------+----------------------+ | None | Local to Pod (kube- | Access Risk | Access to pod's | Accessing the pod's | ['/var/run/secrets/k | | | hunter-9vsfb) | | secrets | secrets within a | ubernetes.io/service | | | | | | compromised pod | ... | | | | | | might disclose | | | | | | | valuable data to a | | | | | | | potential attacker | | +--------+----------------------+----------------------+----------------------+----------------------+----------------------+ | KHV050 | Local to Pod (kube- | Access Risk | Read access to pod's | Accessing the pod | eyJhbGciOiJSUzI1NiIs | | | hunter-9vsfb) | | service account | service account | ImtpZCI6Im5yTlI3ZC1N | | | | | token | token gives an | ... | | | | | | attacker the option | | | | | | | to use the server | | | | | | | API | | +--------+----------------------+----------------------+----------------------+----------------------+----------------------+