File tree 6 files changed +120
-2
lines changed
6 files changed +120
-2
lines changed Original file line number Diff line number Diff line change
1
+ .idea
Original file line number Diff line number Diff line change 1
- # vulnerable-kubernetes-deployments
2
- For learning, research and testing and /evading/ Kubernetes security tools.
1
+ # Vulnerable Kubernetes Deployments
2
+
3
+ For learning, researching, testing and \[ evaluating | evading \] Kubernetes
4
+ security tools. This project is inspired by [ Vulhub] but uses Kubernetes
5
+ deployments instead of Docker Compose services.
6
+
7
+ [ Vulhub ] : https://github.com/vulhub/vulhub
8
+
9
+ ## Quick Start
10
+
11
+ Deploy a vulnerable pgAdmin:
12
+
13
+ ```
14
+ k apply -f python/CVE-2023-5002/all.yaml
15
+ ```
16
+
17
+ ```
18
+ k port-forward -n pgadmin-cve-2023-5002 svc/pgadmin 5050:5050
19
+ ```
20
+
21
+ Open http://localhost:5050 in your web browser to access pgAdmin console.
22
+
23
+ > Uninstall pgAdmin with:
24
+ >
25
+ > ```
26
+ > k delete -f python/CVE-2023-5002/all.yaml
27
+ > ```
28
+
29
+ ## Contributing
30
+
31
+ At your own risk!
32
+
33
+ ## License
34
+
35
+ TBD
Original file line number Diff line number Diff line change
1
+ # pgAdmin CVE-2023 -5002
2
+
3
+ https://github.com/vulhub/vulhub/tree/master/pgadmin/CVE-2023-5002
Original file line number Diff line number Diff line change
1
+ ---
2
+ apiVersion : v1
3
+ kind : Namespace
4
+ metadata :
5
+ name : pgadmin-cve-2023-5002
6
+ ---
7
+ apiVersion : v1
8
+ kind : Service
9
+ metadata :
10
+ name : pgadmin
11
+ namespace : pgadmin-cve-2023-5002
12
+ spec :
13
+ selector :
14
+ app : pgadmin
15
+ ports :
16
+ - protocol : TCP
17
+ port : 5050
18
+ targetPort : 5050
19
+ ---
20
+ apiVersion : apps/v1
21
+ kind : Deployment
22
+ metadata :
23
+ name : pgadmin
24
+ namespace : pgadmin-cve-2023-5002
25
+ spec :
26
+ replicas : 1
27
+ selector :
28
+ matchLabels :
29
+ app : pgadmin
30
+ template :
31
+ metadata :
32
+ labels :
33
+ app : pgadmin
34
+ spec :
35
+ containers :
36
+ - name : pgadmin
37
+ image : docker.io/vulhub/pgadmin:7.6@sha256:efbd4438dd0b9832ec0be07d08a83100b8cee8b74b26330c8560a6b9005f5788
38
+ ports :
39
+ - containerPort : 5050
Original file line number Diff line number Diff line change
1
+ # Ruby CVE-2018 -3760
2
+
3
+ https://github.com/vulhub/vulhub/tree/master/rails/CVE-2018-3760
Original file line number Diff line number Diff line change
1
+ ---
2
+ apiVersion : v1
3
+ kind : Namespace
4
+ metadata :
5
+ name : ruby-cve-2018-3760
6
+ ---
7
+ apiVersion : v1
8
+ kind : Service
9
+ metadata :
10
+ name : ruby
11
+ namespace : ruby-cve-2018-3760
12
+ spec :
13
+ selector :
14
+ app : ruby
15
+ ports :
16
+ - protocol : TCP
17
+ port : 3000
18
+ targetPort : 3000
19
+ ---
20
+ apiVersion : apps/v1
21
+ kind : Deployment
22
+ metadata :
23
+ name : ruby
24
+ namespace : ruby-cve-2018-3760
25
+ spec :
26
+ replicas : 1
27
+ selector :
28
+ matchLabels :
29
+ app : ruby
30
+ template :
31
+ metadata :
32
+ labels :
33
+ app : ruby
34
+ spec :
35
+ containers :
36
+ - name : ruby
37
+ image : docker.io/vulhub/rails:5.0.7@sha256:42655c82cfb23067a2057da6fea7d72115fd4175eb0c7a2ffb6918220e13a284
38
+ ports :
39
+ - containerPort : 3000
You can’t perform that action at this time.
0 commit comments