Filtered by vendor Kubernetes
Subscriptions
Filtered by product Ingress-nginx
Subscriptions
Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-25746 | 1 Kubernetes | 1 Ingress-nginx | 2024-09-17 | 7.6 High |
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use .metadata.annotations in an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster. | ||||
CVE-2021-25742 | 2 Kubernetes, Netapp | 2 Ingress-nginx, Trident | 2024-09-16 | 7.6 High |
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the custom snippets feature to obtain all secrets in the cluster. | ||||
CVE-2021-25745 | 1 Kubernetes | 1 Ingress-nginx | 2024-09-16 | 7.6 High |
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the spec.rules[].http.paths[].path field of an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster. | ||||
CVE-2023-5044 | 1 Kubernetes | 1 Ingress-nginx | 2024-09-10 | 7.6 High |
Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation. | ||||
CVE-2020-8553 | 1 Kubernetes | 1 Ingress-nginx | 2024-08-04 | 5.9 Medium |
The Kubernetes ingress-nginx component prior to version 0.28.0 allows a user with the ability to create namespaces and to read and create ingress objects to overwrite the password file of another ingress which uses nginx.ingress.kubernetes.io/auth-type: basic and which has a hyphenated namespace or secret name. | ||||
CVE-2021-25748 | 1 Kubernetes | 1 Ingress-nginx | 2024-08-03 | 7.6 High |
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `extensions` API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster. | ||||
CVE-2022-4886 | 1 Kubernetes | 1 Ingress-nginx | 2024-08-03 | 8.8 High |
Ingress-nginx `path` sanitization can be bypassed with `log_format` directive. | ||||
CVE-2023-5043 | 1 Kubernetes | 1 Ingress-nginx | 2024-08-02 | 7.6 High |
Ingress nginx annotation injection causes arbitrary command execution. |
Page 1 of 1.