CVE-2024-7646
CVSS V2 None
CVSS V3 None
Description
A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
Overview
- CVE ID
- CVE-2024-7646
- Assigner
- kubernetes
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-08-16T17:36:53.783Z
- Last Modified Date
- 2024-08-16T20:02:54.833Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/kubernetes/kubernetes/issues/126744 | issue-tracking |
https://groups.google.com/g/kubernetes-security-announce/c/a1__cKjWkfA | mailing-list |
https://github.com/kubernetes/ingress-nginx/pull/11719 | patch |
https://github.com/kubernetes/ingress-nginx/pull/11721 | patch |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-7646 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7646 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-08-17 13:03:22 | Added to TrackCVE |