Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-5815

system:controller:horizontal-pod-autoscaler ClusterRoleBinding referencing non existing serviceAccount

    XMLWordPrintable

Details

    • Low
    • False
    • Hide

      None

      Show
      None

    Description

      Description of problem:

      $ oc get clusterversion
      NAME      VERSION   AVAILABLE   PROGRESSING   SINCE   STATUS
      version   4.11.20   True        False         41h     Cluster version is 4.11.20
      
      $ oc get ClusterRoleBinding system:controller:horizontal-pod-autoscaler -o yaml
      apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRoleBinding
      metadata:
        annotations:
          rbac.authorization.kubernetes.io/autoupdate: "true"
        creationTimestamp: "2023-01-11T13:09:19Z"
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: system:controller:horizontal-pod-autoscaler
        resourceVersion: "11422"
        uid: 92b4ece6-3554-4348-a465-598714c3f260
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: system:controller:horizontal-pod-autoscaler
      subjects:
      - kind: ServiceAccount
        name: horizontal-pod-autoscaler
        namespace: kube-system
      - kind: ServiceAccount
        name: horizontal-pod-autoscaler
        namespace: openshift-infra
      
      $ oc get sa horizontal-pod-autoscaler -n kube-system
      NAME                        SECRETS   AGE
      horizontal-pod-autoscaler   2         44h
      
      $ oc get sa horizontal-pod-autoscaler -n openshift-infra
      Error from server (NotFound): serviceaccounts "horizontal-pod-autoscaler" not found
      
      The serviceAccount horizontal-pod-autoscaler in openshift-infra namespace does not exist and therefore should not be referenced in the ClusterRoleBinding.
      
      From Security point of view, it's recommended to remove non existig serviceAccounts from ClusterRoleBindings as a potential attacker could abuse the current state by creating the necessary serviceAccount and gain undesired permissions.

      Version-Release number of selected component (if applicable):

      OpenShift Container Platform 4 (all version from what we have found)

      How reproducible:

      Always

      Steps to Reproduce:

      1. Install OpenShift Container Platform 4
      2. Run oc get ClusterRoleBinding system:controller:horizontal-pod-autoscaler -o yaml

      Actual results:

      $ oc get ClusterRoleBinding system:controller:horizontal-pod-autoscaler -o yaml
      apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRoleBinding
      metadata:
        annotations:
          rbac.authorization.kubernetes.io/autoupdate: "true"
        creationTimestamp: "2023-01-11T13:09:19Z"
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: system:controller:horizontal-pod-autoscaler
        resourceVersion: "11422"
        uid: 92b4ece6-3554-4348-a465-598714c3f260
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: system:controller:horizontal-pod-autoscaler
      subjects:
      - kind: ServiceAccount
        name: horizontal-pod-autoscaler
        namespace: kube-system
      - kind: ServiceAccount
        name: horizontal-pod-autoscaler
        namespace: openshift-infra
      

      Expected results:

      $ oc get ClusterRoleBinding system:controller:horizontal-pod-autoscaler -o yaml
      apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRoleBinding
      metadata:
        annotations:
          rbac.authorization.kubernetes.io/autoupdate: "true"
        creationTimestamp: "2023-01-11T13:09:19Z"
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: system:controller:horizontal-pod-autoscaler
        resourceVersion: "11422"
        uid: 92b4ece6-3554-4348-a465-598714c3f260
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: system:controller:horizontal-pod-autoscaler
      subjects:
      - kind: ServiceAccount
        name: horizontal-pod-autoscaler
        namespace: kube-system
      

      Additional info:

      Finding related to a Security review done on the OpenShift Container Platform 4 - Platform

      Attachments

        Activity

          People

            joelspeed Joel Speed
            rhn-support-sreber Simon Reber
            Rahul Gangwar Rahul Gangwar
            Votes:
            0 Vote for this issue
            Watchers:
            5 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: