A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
References
Configurations
No configuration.
History
21 Nov 2024, 09:51
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
19 Aug 2024, 13:00
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
16 Aug 2024, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-08-16 18:15
Updated : 2024-11-21 09:51
NVD link : CVE-2024-7646
Mitre link : CVE-2024-7646
CVE.ORG link : CVE-2024-7646
JSON object : View
Products Affected
No product.
CWE
CWE-20
Improper Input Validation
