Jan 24, 2023 · This allows attackers with Item/Configure permission to access and potentially capture Kubernetes credentials they are not entitled to.