Overview

FieldValue
ID1030
NameManage RoleBindings in a namespace (create, update, patch, delete)
Risk CategoryElevation of Privilege
Risk LevelHigh
Role TypeRole
API Groupsrbac.authorization.k8s.io
Resourcesrolebindings
Verbscreate, update, patch, delete
TagsBindingToPrivilegedRole PrivilegeEscalation RBACManipulation

Description

Allows creating, modifying, or deleting RoleBindings within a specific namespace. This enables an attacker to bind users, groups, or service accounts to Roles within that namespace. If a powerful ClusterRole is bound to a service account in the namespace, this can lead to privilege escalation.