A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
Metrics
Affected Vendors & Products
References
History
Mon, 19 Aug 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 16 Aug 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster. | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: kubernetes
Published: 2024-08-16T17:36:53.783Z
Updated: 2024-08-19T18:28:09.677Z
Reserved: 2024-08-09T14:23:20.118Z
Link: CVE-2024-7646
Vulnrichment
Updated: 2024-08-16T20:02:54.833Z
NVD
Status : Awaiting Analysis
Published: 2024-08-16T18:15:10.970
Modified: 2024-11-21T09:51:52.213
Link: CVE-2024-7646
Redhat
No data.