December 9, 2019

215 words 2 mins read

Shopifys $25k Bug Report, and the Cluster Takeover That Didnt Happen

Shopifys $25k Bug Report, and the Cluster Takeover That Didnt Happen

In May, a security researcher reported a vulnerability in a Shopify microservice and demonstrated how it could be used to access keys from the Google Cloud metadata API. This could have led to a clust …

Talk Title Shopifys $25k Bug Report, and the Cluster Takeover That Didnt Happen
Speakers Greg Castle (Kubernetes/GKE Security Tech Lead, Google), Shane Lawrence (Senior Infrastructure Security Engineer, Shopify)
Conference KubeCon + CloudNativeCon North America
Conf Tag
Location Seattle, WA, USA
Date Dec 9-14, 2018
URL Talk Page
Slides Talk Slides
Video

In May, a security researcher reported a vulnerability in a Shopify microservice and demonstrated how it could be used to access keys from the Google Cloud metadata API. This could have led to a cluster takeover, for which Shopify awarded $25k through its bug bounty program. Shane will share his experience responding to the report, analyzing Kubernetes audit logs, and hardening the cluster to block the escalation path. Together, Greg and Shane will describe some example Kubernetes audit log queries that can help discover unusual activity in the form of Kubernetes API access, and assess the impact of credential exposure, such as in this report. The collection of example queries will be released for use by the Kubernetes community and we will also share some hardening best practices.

comments powered by Disqus