A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the spec.rules[].http.paths[].path field of an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
References
Link Resource
https://github.com/kubernetes/ingress-nginx/issues/8502 Issue Tracking Mitigation Third Party Advisory
https://groups.google.com/g/kubernetes-security-announce/c/7vQrpDZeBlc Issue Tracking Mailing List Mitigation Third Party Advisory
https://security.netapp.com/advisory/ntap-20220609-0006/ Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: kubernetes

Published: 2022-04-22T00:00:00

Updated: 2022-06-09T18:06:16

Reserved: 2021-01-21T00:00:00


Link: CVE-2021-25745

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-05-06T01:15:09.047

Modified: 2022-12-02T22:41:53.333


Link: CVE-2021-25745

JSON object: View

cve-icon Redhat Information

No data.

CWE