Skip to content

Commit acc34fc

Browse files
committed
Add first pgAdmin and Ruby on Rails deployments
1 parent d5b98ad commit acc34fc

File tree

6 files changed

+120
-2
lines changed

6 files changed

+120
-2
lines changed

.gitignore

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
.idea

README.md

+35-2
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,35 @@
1-
# vulnerable-kubernetes-deployments
2-
For learning, research and testing and /evading/ Kubernetes security tools.
1+
# Vulnerable Kubernetes Deployments
2+
3+
For learning, researching, testing and \[ evaluating | evading \] Kubernetes
4+
security tools. This project is inspired by [Vulhub] but uses Kubernetes
5+
deployments instead of Docker Compose services.
6+
7+
[Vulhub]: https://github.com/vulhub/vulhub
8+
9+
## Quick Start
10+
11+
Deploy a vulnerable pgAdmin:
12+
13+
```
14+
k apply -f python/CVE-2023-5002/all.yaml
15+
```
16+
17+
```
18+
k port-forward -n pgadmin-cve-2023-5002 svc/pgadmin 5050:5050
19+
```
20+
21+
Open http://localhost:5050 in your web browser to access pgAdmin console.
22+
23+
> Uninstall pgAdmin with:
24+
>
25+
> ```
26+
> k delete -f python/CVE-2023-5002/all.yaml
27+
> ```
28+
29+
## Contributing
30+
31+
At your own risk!
32+
33+
## License
34+
35+
TBD

python/CVE-2023-5002/README.md

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
# pgAdmin CVE-2023-5002
2+
3+
https://github.com/vulhub/vulhub/tree/master/pgadmin/CVE-2023-5002

python/CVE-2023-5002/all.yaml

+39
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
apiVersion: v1
3+
kind: Namespace
4+
metadata:
5+
name: pgadmin-cve-2023-5002
6+
---
7+
apiVersion: v1
8+
kind: Service
9+
metadata:
10+
name: pgadmin
11+
namespace: pgadmin-cve-2023-5002
12+
spec:
13+
selector:
14+
app: pgadmin
15+
ports:
16+
- protocol: TCP
17+
port: 5050
18+
targetPort: 5050
19+
---
20+
apiVersion: apps/v1
21+
kind: Deployment
22+
metadata:
23+
name: pgadmin
24+
namespace: pgadmin-cve-2023-5002
25+
spec:
26+
replicas: 1
27+
selector:
28+
matchLabels:
29+
app: pgadmin
30+
template:
31+
metadata:
32+
labels:
33+
app: pgadmin
34+
spec:
35+
containers:
36+
- name: pgadmin
37+
image: docker.io/vulhub/pgadmin:7.6@sha256:efbd4438dd0b9832ec0be07d08a83100b8cee8b74b26330c8560a6b9005f5788
38+
ports:
39+
- containerPort: 5050

ruby/CVE-2018-3760/README.md

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
# Ruby CVE-2018-3760
2+
3+
https://github.com/vulhub/vulhub/tree/master/rails/CVE-2018-3760

ruby/CVE-2018-3760/all.yaml

+39
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
apiVersion: v1
3+
kind: Namespace
4+
metadata:
5+
name: ruby-cve-2018-3760
6+
---
7+
apiVersion: v1
8+
kind: Service
9+
metadata:
10+
name: ruby
11+
namespace: ruby-cve-2018-3760
12+
spec:
13+
selector:
14+
app: ruby
15+
ports:
16+
- protocol: TCP
17+
port: 3000
18+
targetPort: 3000
19+
---
20+
apiVersion: apps/v1
21+
kind: Deployment
22+
metadata:
23+
name: ruby
24+
namespace: ruby-cve-2018-3760
25+
spec:
26+
replicas: 1
27+
selector:
28+
matchLabels:
29+
app: ruby
30+
template:
31+
metadata:
32+
labels:
33+
app: ruby
34+
spec:
35+
containers:
36+
- name: ruby
37+
image: docker.io/vulhub/rails:5.0.7@sha256:42655c82cfb23067a2057da6fea7d72115fd4175eb0c7a2ffb6918220e13a284
38+
ports:
39+
- containerPort: 3000

0 commit comments

Comments
 (0)