First published: Wed Oct 25 2023(Updated: )
A security issue was identified in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where the nginx.ingress.kubernetes.io/permanent-redirect annotation on an Ingress object (in the networking.k8s.io or extensions API group) can be used to inject arbitrary commands, and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
Credit: jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
go/k8s.io/ingress-nginx | <1.9.0 | 1.9.0 |
Kubernetes Nginx Ingress Controller | <1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5044 is a vulnerability that allows code injection via the nginx.ingress.kubernetes.io/permanent-redirect annotation in Kubernetes ingress-nginx.
CVE-2023-5044 has a severity score of 8.8 (high).
Versions up to and excluding 1.9.0 of Kubernetes ingress-nginx are affected by CVE-2023-5044.
To fix CVE-2023-5044, upgrade to a version of Kubernetes ingress-nginx that is higher than 1.9.0.
You can find more information about CVE-2023-5044 in the following references: [GitHub](https://github.com/kubernetes/ingress-nginx/issues/10572), [Google Groups](https://groups.google.com/g/kubernetes-security-announce/c/ukuYYvRNel0), [Openwall](http://www.openwall.com/lists/oss-security/2023/10/25/3).