Chall-Manager's invalid NetworkPolicy enables a malicious actor to pivot into another namespace
High severity
GitHub Reviewed
Published
Mar 14, 2026
in
ctfer-io/chall-manager
•
Updated Mar 16, 2026
Description
Published to the GitHub Advisory Database
Mar 16, 2026
Reviewed
Mar 16, 2026
Last updated
Mar 16, 2026
Impact
Due to a mis-written NetworkPolicy, a malicious actor can pivot from an instance to any Pod out of the origin namespace.
This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement.
In the specific case of
sdk/kubernetes.Komposeit does not isolate the instances.Patch
Removing the
inter-nsNetworkPolicy patches the vulnerability. If updates are not possible in production environments, we recommend to manually delete it and update as soon as possible.Workaround
Given your context, delete the failing network policy that should be prefixed by
inter-ns-in the target namespace.You can use the following to delete all matching network policy. If unsure of the outcome, please do it manually.
References