Ingress-nginx `path` sanitization can be bypassed with newline character
CVE-2021-25748
7.6HIGH
Summary
A security vulnerability has been identified in ingress-nginx that allows an authenticated user to exploit newline characters in the spec.rules[].http.paths[].path
field of an Ingress object. This manipulation can circumvent existing sanitization measures, enabling the unauthorized retrieval of the ingress-nginx controller's credentials, which by default possess access to all secrets within the Kubernetes cluster. This flaw poses a significant risk as it could lead to unauthorized access to sensitive information and requires immediate attention to mitigate potential exploitation.
Affected Version(s)
Kubernetes ingress-nginx < 1.2.1
References
CVSS V3.1
Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Gafnit Amiga