Kubernetes

Ingress-nginx

21 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung Medienbericht
  • EPSS 20.8%
  • Veröffentlicht 24.03.2025 23:29:05
  • Zuletzt bearbeitet 04.02.2026 20:16:02

A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context o...

Warnung Medienbericht
  • EPSS 90.25%
  • Veröffentlicht 24.03.2025 23:28:48
  • Zuletzt bearbeitet 04.02.2026 20:16:02

A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure ...

  • EPSS 25.76%
  • Veröffentlicht 16.08.2024 18:15:10
  • Zuletzt bearbeitet 21.11.2024 09:51:52

A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials ...

  • EPSS 8.75%
  • Veröffentlicht 25.10.2023 20:15:18
  • Zuletzt bearbeitet 13.02.2025 18:15:54

Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.

  • EPSS 4.01%
  • Veröffentlicht 25.10.2023 20:15:18
  • Zuletzt bearbeitet 13.02.2025 18:15:54

Ingress nginx annotation injection causes arbitrary command execution.

  • EPSS 0.19%
  • Veröffentlicht 25.10.2023 20:15:09
  • Zuletzt bearbeitet 13.02.2025 17:15:51

Ingress-nginx `path` sanitization can be bypassed with `log_format` directive.

  • EPSS 0.06%
  • Veröffentlicht 24.05.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 05:55:20

A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s....

  • EPSS 0.58%
  • Veröffentlicht 06.05.2022 01:15:09
  • Zuletzt bearbeitet 21.11.2024 05:55:20

A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use .metadata.annotations in an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-ngi...

  • EPSS 0.36%
  • Veröffentlicht 06.05.2022 01:15:09
  • Zuletzt bearbeitet 21.11.2024 05:55:20

A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the spec.rules[].http.paths[].path field of an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials...

Exploit
  • EPSS 0.63%
  • Veröffentlicht 29.10.2021 04:15:08
  • Zuletzt bearbeitet 21.11.2024 05:55:19

A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the custom snippets feature to obtain all secrets in the cluster.