Description
Controllers are responsible for pods state using a declaration of pod definition. Pods utilize a service account associated with them to communicate with the Kubernetes API, and that service account is mounted by default to any newly created containers. Orca has detected that the Controller {K8sController} creates pods that can bind a role to a pod's service account. An attacker with access to the pod's container can extract the service account token and impersonate to it in order to elevate their privileges in {K8sController.PodSpec.K8sCluster} cluster by binding a privileged role to the service account they're using.