Skip to content

Conversation

anibal2222
Copy link

Issue #, if available: NA

Description of changes:

Starting on Kubernetes 1.31, Kubernetes uses the WebSocket protocol instead of SPDY for streaming. Following this transition, the subresources "pods/attach", "pods/exec", "pods/portforward", "pods/proxy" and "nodes/proxy" were accessible through a "GET" with Upgrade header instead of only "CREATE". As a result, this allowed users with read-only access to be able to execute streaming commands, like "exec" and "port-forward", exposing a significant security gap.

In order to prevent this behavior, the only access policies with permissions for the subresources ("pods/attach", "pods/exec", "pods/portforward", "pods/proxy" and "nodes/proxy") are: "AmazonEKSAdminPolicy", "AmazonEKSClusterAdminPolicy" and "AmazonEKSEditPolicy".

Currently, this change is not documented, which can affect the customer experience since the documentation does not reflect the current behavior of EKS clusters setting wrong expectations.

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

Copy link

This pull request is automatically being deployed by Amplify Hosting (learn more).

Access this pull request here: https://pr-1116.d3rijirjvbh87e.amplifyapp.com

@fincd-aws fincd-aws self-assigned this Sep 22, 2025
@fincd-aws
Copy link
Contributor

Hi thanks!
I'm also going to recheck the tables of access policies in https://docs.aws.amazon.com/eks/latest/userguide/access-policy-permissions.html

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants