Improper Input Validation in k8s.io/ingress-nginx
High severity
GitHub Reviewed
Published
May 7, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
May 6, 2022
Published to the GitHub Advisory Database
May 7, 2022
Reviewed
May 25, 2022
Last updated
Jan 27, 2023
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the spec.rules[].http.paths[].path field of an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
References