A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the spec.rules[].http.paths[].path field of an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
References
Link | Resource |
---|---|
https://github.com/kubernetes/ingress-nginx/issues/8502 | Issue Tracking Mitigation Third Party Advisory |
https://groups.google.com/g/kubernetes-security-announce/c/7vQrpDZeBlc | Issue Tracking Mailing List Mitigation Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220609-0006/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: kubernetes
Published: 2022-04-22T00:00:00
Updated: 2022-06-09T18:06:16
Reserved: 2021-01-21T00:00:00
Link: CVE-2021-25745
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-06T01:15:09.047
Modified: 2022-12-02T22:41:53.333
Link: CVE-2021-25745
JSON object: View
Redhat Information
No data.
CWE