Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1wdm1nLXhnbXgtOW14aM3kBw
Improper Input Validation in k8s.io/ingress-nginx
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the spec.rules[].http.paths[].path field of an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
Permalink: https://github.com/advisories/GHSA-pvmg-xgmx-9mxhJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wdm1nLXhnbXgtOW14aM3kBw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago
CVSS Score: 8.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Identifiers: GHSA-pvmg-xgmx-9mxh, CVE-2021-25745
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-25745
- https://github.com/kubernetes/ingress-nginx/issues/8502
- https://groups.google.com/g/kubernetes-security-announce/c/7vQrpDZeBlc
- https://security.netapp.com/advisory/ntap-20220609-0006/
- https://github.com/advisories/GHSA-pvmg-xgmx-9mxh
Blast Radius: 0.0
Affected Packages
go:k8s.io/ingress-nginx
Dependent packages: 0Dependent repositories: 1
Downloads:
Affected Version Ranges: < 1.2.0
Fixed in: 1.2.0
All affected versions:
All unaffected versions: