Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-59303

Опубликовано: 08 окт. 2025
Источник: redhat
CVSS3: 8.5
EPSS Низкий

Описание

HAProxy Kubernetes Ingress Controller before 3.1.13, when the config-snippets feature flag is used, accepts config snippets from users with create/update permissions. This can result in obtaining an ingress token secret as a response. The fixed versions of HAProxy Enterprise Kubernetes Ingress Controller are 3.0.16-ee1, 1.11.13-ee1, and 1.9.15-ee1.

A flaw was found in HAProxy Kubernetes Ingress Controller. This vulnerability allows an authenticated attacker to obtain an ingress token secret by submitting malicious configuration snippets when the config-snippets feature is enabled.

Отчет

This flaw is rated MODERATE primarily because successful exploitation requires the attacker to possess existing privileges allowing them to create or modify Ingress or Service objects in a cluster environment. The core flaw is a configuration injection weakness where the KIC's config-snippets feature can be misused to embed arbitrary HAProxy directives that are not properly sanitized. This malicious code allows an attacker to access environment variables, specifically the highly sensitive Kubernetes service account token secret, which is available to the ingress controller pod. Obtaining this token permits an authenticated user to perform privilege escalation and access cluster data. So essentially, for a product to be affected, it has to both ship the base haproxy RPM and run it in the Kubernetes Ingres Controller.

Меры по смягчению последствий

Disabling the config-snippets feature before starting the Ingres Controller is a useful mitigation for this vulnerability. This can be done by starting the Ingres Controller with the following flag: --disable-config-snippets Upgrade to version 3.2 and above to fix this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 5haproxyOut of support scope
Red Hat Enterprise Linux 10haproxyAffected
Red Hat Enterprise Linux 7haproxyAffected
Red Hat Enterprise Linux 8haproxyAffected
Red Hat Enterprise Linux 9haproxyAffected
Red Hat OpenShift Container Platform 4haproxyNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-791
https://bugzilla.redhat.com/show_bug.cgi?id=2402538haproxy: HAProxy Kubernetes Ingress Controller: Secret Leak via Config Snippets

EPSS

Процентиль: 0%
0.00002
Низкий

8.5 High

CVSS3

Связанные уязвимости

CVSS3: 6.4
nvd
6 месяцев назад

HAProxy Kubernetes Ingress Controller before 3.1.13, when the config-snippets feature flag is used, accepts config snippets from users with create/update permissions. This can result in obtaining an ingress token secret as a response. The fixed versions of HAProxy Enterprise Kubernetes Ingress Controller are 3.0.16-ee1, 1.11.13-ee1, and 1.9.15-ee1.

CVSS3: 6.4
github
6 месяцев назад

HAProxy Kubernetes Ingress Controller before 3.1.13, when the config-snippets feature flag is used, accepts config snippets from users with create/update permissions. This can result in obtaining an ingress token secret as a response. The fixed versions of HAProxy Enterprise Kubernetes Ingress Controller are 3.0.16-ee1, 1.11.13-ee1, and 1.9.15-ee1.

EPSS

Процентиль: 0%
0.00002
Низкий

8.5 High

CVSS3