A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `extensions` API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
References
Link | Resource |
---|---|
https://github.com/kubernetes/ingress-nginx/issues/8686 | Issue Tracking Mitigation Vendor Advisory |
https://groups.google.com/g/kubernetes-security-announce/c/avaRYa9c7I8 | Mailing List Mitigation Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: kubernetes
Published: 2023-05-24T00:00:00
Updated: 2023-05-24T00:00:00
Reserved: 2021-01-21T00:00:00
Link: CVE-2021-25748
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-05-24T17:15:09.253
Modified: 2023-06-01T20:44:14.080
Link: CVE-2021-25748
JSON object: View
Redhat Information
No data.
CWE