Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-25746

Опубликовано: 22 апр. 2022
Источник: redhat
CVSS3: 7.1
EPSS Низкий

Описание

A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use .metadata.annotations in an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.

A flaw was found in the ingress-nginx controller. When a user creates or updates ingress objects, credentials of the ingress-nginx controller can be obtained by accessing .metadata.annotations.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/management-ingress-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20->CWE-179
https://bugzilla.redhat.com/show_bug.cgi?id=2076618k8s.io/ingress-nginx: directive injection via annotations

EPSS

Процентиль: 68%
0.00578
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.6
nvd
почти 4 года назад

A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use .metadata.annotations in an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.

CVSS3: 7.1
github
почти 4 года назад

A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use .metadata.annotations in an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.

EPSS

Процентиль: 68%
0.00578
Низкий

7.1 High

CVSS3