CVE-2021-25748Improper Input Validation in Kubernetes Ingress-nginx

Severity
6.5MEDIUMNVD
CNA7.6
EPSS
0.1%
top 82.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 24

Description

A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `extensions` API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

CVEListV5kubernetes/kubernetes_ingress-nginxunspecified1.2.1

🔴Vulnerability Details

3
CVEList
Ingress-nginx `path` sanitization can be bypassed with newline character2023-05-24
GHSA
Ingress-nginx `path` sanitization can be bypassed with newline character2023-05-24
OSV
Ingress-nginx `path` sanitization can be bypassed with newline character2023-05-24
CVE-2021-25748 — Improper Input Validation | cvebase