Cloud Foundry Container Runtime, versions before 0.28.0, deploys K8s worker nodes that contains a configuration file with IAAS credentials. A malicious user with access to the k8s nodes can obtain IAAS credentials allowing the user to escalate privileges to gain access to the IAAS account.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cloudfoundry container runtime |