Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Kubernetes Kustomization Disclosure

By kannthu

Medium
Vidoc logoVidoc Module
#exposure#config#kubernetes
Description

What is Kubernetes Kustomization Disclosure?

Kubernetes Kustomization Disclosure is a module designed to detect misconfigurations in a Kubernetes cluster. It focuses on exposing sensitive information through misconfigured Kustomization configuration files.

This module targets Kubernetes clusters and specifically looks for misconfigurations in Kustomization files. These files are used to define and customize Kubernetes resources, such as deployments and services.

The severity of this module is classified as medium, indicating that it can potentially lead to security vulnerabilities if left unaddressed.

Impact

If a misconfiguration is detected by this module, it means that sensitive information within the Kustomization files is exposed. This can include API versions, resource definitions, namespaces, and common labels. Exposing such information can potentially provide attackers with valuable insights into the cluster's configuration and increase the risk of unauthorized access or data breaches.

How the module works?

The Kubernetes Kustomization Disclosure module works by sending HTTP requests to the target Kubernetes cluster and analyzing the responses. It uses a set of matching conditions to identify misconfigurations in the Kustomization files.

One example of a matching condition is checking if the response body contains specific keywords related to Kustomization configuration, such as "apiVersion," "resources," "namespace," "commonLabels," and "Kustomization." Additionally, it verifies that the response headers indicate the content type as "application/yaml" and that the HTTP status code is 200 (OK).

By combining these matching conditions, the module can effectively identify misconfigured Kustomization files that may expose sensitive information.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/kustomization.yml
Matching conditions
word: apiVersion:, resources:, namespace:, com...and
dsl: contains(toLower(all_headers), `applicat...and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability