fix: there is a serious privilege escalation vulnerability in the kubectl terminal tool (#6253)
Signed-off-by: lingbo <lingbo@lingbohome.com>
This commit is contained in:
@@ -234,7 +234,6 @@ func (s *APIServer) buildHandlerChain(handler http.Handler, stopCh <-chan struct
|
||||
iamv1beta1.Resource(iamv1beta1.ResourcesPluralGlobalRole),
|
||||
iamv1beta1.Resource(iamv1beta1.ResourcesPluralGlobalRoleBinding),
|
||||
tenantv1beta1.Resource(tenantv1beta1.ResourcePluralWorkspace),
|
||||
tenantv1beta1.Resource(tenantv1beta1.ResourcePluralWorkspace),
|
||||
tenantv1beta1.Resource(clusterv1alpha1.ResourcesPluralCluster),
|
||||
clusterv1alpha1.Resource(clusterv1alpha1.ResourcesPluralCluster),
|
||||
clusterv1alpha1.Resource(clusterv1alpha1.ResourcesPluralLabel),
|
||||
|
||||
@@ -376,7 +376,6 @@ func (t *terminaler) createKubectlPod(ctx context.Context, podName, username str
|
||||
},
|
||||
},
|
||||
},
|
||||
ServiceAccountName: "kubesphere",
|
||||
Volumes: []corev1.Volume{
|
||||
{
|
||||
Name: "host-time",
|
||||
|
||||
Reference in New Issue
Block a user