GHSA-fwwp-xcxw-39vq

Suggest an improvement
Source
https://github.com/advisories/GHSA-fwwp-xcxw-39vq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-fwwp-xcxw-39vq/GHSA-fwwp-xcxw-39vq.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-fwwp-xcxw-39vq
Aliases
Related
Published
2025-03-25T00:30:26Z
Modified
2025-03-26T08:28:54.568290Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ingress-nginx controller - configuration injection via unsanitized auth-url annotation
Details

A security issue was discovered in ingress-nginx where the auth-url Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

Database specific
{
    "nvd_published_at": "2025-03-25T00:15:15Z",
    "cwe_ids": [
        "CWE-15",
        "CWE-20"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2025-03-25T15:10:02Z"
}
References

Affected packages

Go / k8s.io/ingress-nginx

Package

Name
k8s.io/ingress-nginx
View open source insights on deps.dev
Purl
pkg:golang/k8s.io/ingress-nginx

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.11.5

Go / k8s.io/ingress-nginx

Package

Name
k8s.io/ingress-nginx
View open source insights on deps.dev
Purl
pkg:golang/k8s.io/ingress-nginx

Affected ranges

Type
SEMVER
Events
Introduced
1.12.0-beta.0
Fixed
1.12.1