Kubernetes Remote Code Execution Via Nodes/Proxy GET Permission
Read OriginalThis technical article details a Kubernetes security vulnerability where a service account with nodes/proxy GET permissions can be exploited to execute code on any Pod via the Kubelet API. It covers the exploit mechanism, impact (potential full cluster compromise), lists 69 affected Helm charts (like Prometheus, Datadog), and provides detection guidance, noting the issue is considered 'working as intended' by Kubernetes.
Comments
No comments yet
Be the first to share your thoughts!
Browser Extension
Get instant access to AllDevBlogs from your browser
Top of the Week
1
Quoting Thariq Shihipar
Simon Willison
•
2 votes
2
Using Browser Apis In React Practical Guide
Jivbcoop
•
2 votes
3
Top picks — 2026 January
Paweł Grzybek
•
1 votes
4
In Praise of –dry-run
Henrik Warne
•
1 votes
5
Deep Learning is Powerful Because It Makes Hard Things Easy - Reflections 10 Years On
Ferenc Huszár
•
1 votes
6
Vibe coding your first iOS app
William Denniss
•
1 votes
7
AGI, ASI, A*I – Do we have all we need to get there?
John D. Cook
•
1 votes
8
Dew Drop – January 15, 2026 (#4583)
Alvin Ashcraft
•
1 votes