[Bug]: Unnecessary RBAC permissions in Helm Charts
Yseona opened this issue · 0 comments
What happened?
The bug is that the Deployment jaeger-operator in the charts has too much RBAC permission than it needs. The service account of jaeger-operator
is bound to a role (role.yaml) with the following permissions:
create/delete/patch/update
verb of thepods/replicasets/statefulsets
resource (Role)get
verb of thesecrets
resource (Role)
After reading the source code of jaeger-operator, I didn't find any Kubernetes API usages using these
permissions. Besides, some of these unused permissions may have potential risks. For example, if malicious users gain control of a Kubernetes node running a jaeger-operator
pod, they can use the create replicasets
permission to create privileged containers with malicious container images.
Steps to reproduce
Use helm chart with default values.
Expected behavior
Therefore, these permissions should be rechecked to determine if they are truly unnecessary. If they are, the issue should be fixed by removing these unnecessary permissions or other feasible methods.
Relevant log output
No response
Screenshot
No response
Additional context
No response
Jaeger backend version
No response
SDK
No response
Pipeline
No response
Stogage backend
No response
Operating system
No response
Deployment model
No response
Deployment configs
No response