A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
History

Mon, 19 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
References

Fri, 16 Aug 2024 17:45:00 +0000

Type Values Removed Values Added
Description A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: kubernetes

Published: 2024-08-16T17:36:53.783Z

Updated: 2024-08-19T18:28:09.677Z

Reserved: 2024-08-09T14:23:20.118Z

Link: CVE-2024-7646

cve-icon Vulnrichment

Updated: 2024-08-16T20:02:54.833Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-16T18:15:10.970

Modified: 2024-11-21T09:51:52.213

Link: CVE-2024-7646

cve-icon Redhat

No data.