Kubernetes Pods API Code Execution Vulnerability Scanner
When the service port is available, anyone can execute commands inside the container.
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
5 seconds
Time Interval
2 months 27 days
Scan only one
URL
Toolbox
-
Kubernetes, a container orchestration system used by many companies worldwide, is a type of service. Lots of companies are exposing their Kubernetes API with no authentication; inside the Kubernetes cluster, small containers called Pods are ran. Essentially a pod represents a process inside the cluster. By having this exposed, an attacker can not only see what is running on the Pods but also execute commands on the Pods themselves.