First published: Wed Oct 25 2023(Updated: )
Ingress-nginx `path` sanitization can be bypassed with `log_format` directive.
Credit: jordan@liggitt.net jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
Kubernetes ingress-nginx | <1.8.0 | |
go/k8s.io/ingress-nginx | <1.8.0 | 1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-4886.
The severity of CVE-2022-4886 is high, with a CVSS score of 8.8.
Ingress-nginx version up to 1.8.0 in Kubernetes is affected by CVE-2022-4886.
The `path` sanitization in Ingress-nginx can be bypassed by using the `log_format` directive.
Yes, upgrading to a version of Ingress-nginx above 1.8.0 will fix CVE-2022-4886.