A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `extensions` API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
References
Link Resource
https://github.com/kubernetes/ingress-nginx/issues/8686 Issue Tracking Mitigation Vendor Advisory
https://groups.google.com/g/kubernetes-security-announce/c/avaRYa9c7I8 Mailing List Mitigation Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: kubernetes

Published: 2023-05-24T00:00:00

Updated: 2023-05-24T00:00:00

Reserved: 2021-01-21T00:00:00


Link: CVE-2021-25748

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-05-24T17:15:09.253

Modified: 2023-06-01T20:44:14.080


Link: CVE-2021-25748

JSON object: View

cve-icon Redhat Information

No data.