CVE-2024-7646
Description
A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
CWE
- CWE-20 — CWE-20 Improper Input Validation
Affected
- Kubernetes / ingress-nginx — v=1.11.0 <1.11.2 [affected]; v=1.11.2 [unaffected]; v=1.10.4 [unaffected]; v=0 <1.10.4 [affected]
CVSS
- 3.1 score=8.8 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References
- https://github.com/kubernetes/kubernetes/issues/126744 issue-tracking
- https://groups.google.com/g/kubernetes-security-announce/c/a1__cKjWkfA mailing-list
- https://github.com/kubernetes/ingress-nginx/pull/11719 patch
- https://github.com/kubernetes/ingress-nginx/pull/11721 patch
Source
cvelistV5-main/cves/2024/7xxx/CVE-2024-7646.json