KubiScan - A Tool To Scan Kubernetes Cluster For Risky Permissions
KubiScan helps cluster administrators identify permissions that attackers could potentially exploit to compromise the clusters. This can be especially helpful on large environments where there are lots of permissions that can be challenging to track. KubiScan gathers information about risky roles\clusterroles, rolebindings\clusterrolebindings, users and pods, automating traditional manual processes and giving administrators the visibility they need to reduce risk.
What can it do?
- Identify risky Roles\ClusterRoles
- Identify risky RoleBindings\ClusterRoleBindings
- Identify risky Subjects (Users, Groups and ServiceAccounts)
- Identify risky Pods\Containers
- Dump tokens from pods (all or by namespace)
- Get associated RoleBindings\ClusterRoleBindings to Role, ClusterRole or Subject (user, group or service account)
- List Subjects with specific kind ('User', 'Group' or 'ServiceAccount')
- List rules of RoleBinding or ClusterRoleBinding
- Show Pods that have access to secret data through a volume or environment variables
- Get bootstrap tokens for the cluster
Usage
Container
With
~/.kube/config
fileThis should be executed within the Master node where the config file is located:
docker run -it --rm -e CONF_PATH=~/.kube/config -v /:/tmp cyberark/kubiscan
CONF_PATH
- the cluster config file's path
Inside the container the command kubiscan
is equivalent to python3 /KubiScan/KubiScan.py
.
Notice that in this case, the whole file system will be mounted. This is due to the fact that the config files contain paths to other places in the filesystem that will be different in other environments.
With service account token (good from remote)
Some functionality requires a privileged service account with the following permissions:
- resources:
["roles", "clusterroles", "rolebindings", "clusterrolebindings", "pods", "secrets"]
verbs:["get", "list"]
- resources:
["pods/exec"]
verbs:["create", "get"]
But most of the functionalities are not, so you can use this settings for limited service account:
It can be created by running:
kubectl apply -f - << EOFapiVersion: v1kind: ServiceAccountmetadata: name: kubiscan-sa namespace: default---kind: ClusterRoleBindingapiVersion: rbac.authorization.k8s.io/v1beta1metadata: name: kubiscan-clusterrolebindingsubjects: - kind: ServiceAccount name: kubiscan-sa namespace: default apiGroup: ""roleRef: kind: ClusterRole name: kubiscan-clusterrole apiGroup: ""---kind: ClusterRoleapiVersion: rbac.authorization.k8s.io/v1beta1metadata: name: kubiscan-clusterrolerules: - apiGroups: ["*"] resources: ["roles", "clusterroles", "rolebindings", "clusterrolebindings", "pods"] verbs: ["get", "list"]EOF
Save the service account's token to a file:
kubectl get secrets $(kubectl get sa kubiscan-sa -o json | jq -r '.secrets[0].name') -o json | jq -r '.data.token' | base64 -d > token
Run the container from anywhere you want:
docker run -it --rm -v $PWD/token:/token cyberark/kubiscan
In the shell you will be able to to use kubiscan like that:
kubiscan -ho <master_ip:master_port> -t /token <command>
For example:
kubiscan -ho 192.168.21.129:8443 -t /token -rs
Notice that you can also use the certificate authority (ca.crt) to verify the SSL connection:
docker run -it --rm -v $PWD/token:/token -v <ca_path>/ca.crt:/ca.crt cyberark/kubiscan
Inside the container:
kubiscan -ho <master_ip:master_port> -t /token -c /ca.crt <command>
To remove the privileged service account, run the following commands:
kubectl delete clusterroles kubiscan-clusterrole
kubectl delete clusterrolebindings kubiscan-clusterrolebinding
kubectl delete sa kubiscan-sa
Directly with Python3
Prerequisites:
- Python 3.5+
- Pip3
- Kubernetes Python Client
- Prettytable
- openssl (built-in in ubuntu) - used only for join token
Example for installation on Ubuntu:
apt-get update
apt-get install -y python3 python3-pip
pip3 install kubernetes
pip3 install PTable
Run alias kubiscan='python3 /<KubiScan_folder/KubiScan.py'
to use kubiscan
.
After installing all of the above requirements you can run it in two different ways:
From the Master node:
On the Master node where ~/.kube/config
exist and all the relevant certificates, simply run:
kubiscan <command>
For example: kubiscan -rs
will show all the risky subjects (users, service accounts and groups).
From a remote host:
To use this tool from a remote host, you will need a privileged service account like we explained in the container section.
After you have the token inside a file you can run:
kubiscan -ho <master_ip:master_port> -t /token <command>
Examples
To see all the examples, run python3 KubiScan.py -e
or from within the container kubiscan -e
.
Demo
A small example of KubiScan usage:
There is a file named risky_roles.yaml
. This file contains templates for risky roles with priority.
Although the kind in each role is Role
, these templates will be compared against any Role\ClusterRole in the cluster.
When each of these roles is checked against a role in the cluster, it checks if the role in the cluster contains the rules from the risky role. If it does, it will be marked as risky.
We added all the roles we found to be risky, but because each one can define the term "risky" in a different way, you can modify the file by adding\removing roles you think are more\less risky.
References:
For more comments, suggestions or questions, you can contact Eviatar Gerzi (@g3rzi) and CyberArk Labs.
Source: feedproxy.google.com