First published: Fri Aug 16 2024(Updated: )
A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
Credit: jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
Kubernetes Nginx Ingress Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7646 has been classified as a critical vulnerability due to its potential to allow unauthorized access to sensitive credentials.
To mitigate CVE-2024-7646, ensure that proper role-based access controls are implemented to restrict unauthorized permissions for creating Ingress objects.
CVE-2024-7646 can allow an attacker to inject arbitrary commands, leading to the exposure of sensitive information from the ingress-nginx controller.
CVE-2024-7646 affects all versions of ingress-nginx that allow creation of Ingress objects without proper validation.
As of now, there have been no public reports of active exploits targeting CVE-2024-7646.