logo

Database

Terraform Allow Privilege Escalation Enabled

Description

Detects Kubernetes container configurations that allow privilege escalation, which enables containers to gain additional privileges at runtime. This poses a security risk as containers could escalate their permissions beyond their intended scope, potentially compromising the host system and other containers.

Weakness:

267 - Excessive Privileges - Kubernetes

Category: Functionality Abuse

Detection Strategy

    Analyzes Kubernetes resource files (like Deployments, StatefulSets, etc.) that define container configurations

    Examines the container security context settings within pod specifications

    Reports a vulnerability when allowPrivilegeEscalation is explicitly set to true or when security context is missing (defaults to true)

    Checks container configurations at all supported resource levels including Pod specs, container definitions, and security contexts

Vulnerable code example

resource "kubernetes_pod_v1" "vulnerable_pod" {
  metadata {
    name = "vulnerable-pod"
  }
  spec {
    container {
      name  = "unsafe-container"
      image = "nginx"...

✅ Secure code example

resource "kubernetes_pod_v1" "secure_pod" {
  metadata {
    name = "secure-pod"
    labels = {
      app = "web"
    }
  }
  spec {...