GHSA-863x-868h-968x

Source
https://github.com/advisories/GHSA-863x-868h-968x
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-863x-868h-968x/GHSA-863x-868h-968x.json
Aliases
Published
2023-05-24T18:30:26Z
Modified
2024-01-31T13:56:49.788823Z
Details

A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the spec.rules[].http.paths[].path field of an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.

References

Affected packages

Go / k8s.io/ingress-nginx

Package

Affected ranges

Type
SEMVER
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.2.1