TF 0201 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Delete pod logs

Property Value
Language terraform
Severity medium
Vulnerability Type omission

Description

Granting 'delete' or 'deletecollection' permissions on the 'pods/log' resource in Kubernetes Roles or ClusterRoles allows users to remove pod logs, which can obscure important audit trails. This weakens the ability to monitor and investigate cluster activities.

Impact

If exploited, an attacker with these permissions could delete pod logs to hide evidence of malicious actions, hindering incident response and forensic analysis. This could allow security breaches to go undetected and compromise compliance requirements.

Resolution

Remove verbs 'delete' and 'deletecollection' for resource 'pods/log' for Role and ClusterRole