Kubernetes Pods API Code Execution Vulnerability Scanner

Details
Stay Up To Date
Asset Type

DOMAIN,IP,URL

Need Membership

Yes

Asset Verify

Yes

API Support

Yes

Estimate Time (Second)

5

Kubernetes Pods API Code Execution Vulnerability Scanner Detail

When the service port is available, anyone can execute commands inside the container.

Kubernetes, a container orchestration system used by many companies worldwide, is a type of service. Lots of companies are exposing their Kubernetes API with no authentication; inside the Kubernetes cluster, small containers called Pods are ran. Essentially a pod represents a process inside the cluster. By having this exposed, an attacker can not only see what is running on the Pods but also execute commands on the Pods themselves.

Some Advice for Common Problems

If you have an API that doesn't have any authentication mechanism, set an authentication mechanism immediately.

Community Discussions

Need a Full Assesment?

Get help from professional hackers. Learn about our penetration test service now!

Request Pentest Service