Overview

FieldValue
ID1045
NameManage CustomResourceDefinitions
Risk CategoryTampering
Risk LevelCritical
Role TypeClusterRole
API Groupsapiextensions.k8s.io
Resourcescustomresourcedefinitions
Verbscreate, update, patch, delete
TagsCRDManipulation PotentialPrivilegeEscalation Tampering

Description

Permits creating, updating, or deleting CustomResourceDefinitions (CRDs). CRDs extend the Kubernetes API. Modifying CRDs can lead to tampering with custom controllers, potentially causing unexpected behavior, privilege escalation if controllers manage sensitive resources, or denial of service.