You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Mar 5, 2024. It is now read-only.
Have discovered and created an exploit for an authorization issue in Kiam.
Kiam-server allows every node's kiam-agent to request and receive token for the AWS roles in use on other nodes. This is due to the lack of a policy in in policy.go to check whether the kiam-agent's request is for a pod running on that kiam-agent's node.
Have discovered and created an exploit for an authorization issue in Kiam.
Kiam-server allows every node's kiam-agent to request and receive token for the AWS roles in use on other nodes. This is due to the lack of a policy in in policy.go to check whether the kiam-agent's request is for a pod running on that kiam-agent's node.
This may be the issue that @iangcarroll is discussing in (Kiam Issue 516)(https://github.com/uswitch/kiam/issues/516].
The text was updated successfully, but these errors were encountered: