Skip to content

Commit 457c0cc

Browse files
authored
Merge pull request #31 from DmitriyLewen/vulns-CVE-2021-25748.json
feat(vulns): add `CVE-2021-25748`
2 parents 20f8133 + dccb47d commit 457c0cc

File tree

1 file changed

+44
-0
lines changed

1 file changed

+44
-0
lines changed

vulns/CVE-2021-25748.json

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"id": "CVE-2021-25748",
3+
"modified": "2022-06-10T16:01:41Z",
4+
"published": "2022-06-10T16:01:41Z",
5+
"summary": "Ingress-nginx `path` sanitization can be bypassed with newline character",
6+
"details": "A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `extensions` API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.",
7+
"affected": [
8+
{
9+
"package": {
10+
"ecosystem": "kubernetes",
11+
"name": "k8s.io/ingress-nginx"
12+
},
13+
"severity": [
14+
{
15+
"type": "CVSS_V3",
16+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"
17+
}
18+
],
19+
"ranges": [
20+
{
21+
"type": "SEMVER",
22+
"events": [
23+
{
24+
"introduced": "0"
25+
},
26+
{
27+
"fixed": "1.2.1"
28+
}
29+
]
30+
}
31+
]
32+
}
33+
],
34+
"references": [
35+
{
36+
"type": "ADVISORY",
37+
"url": "https://github.com/kubernetes/kubernetes/issues/126814"
38+
},
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://www.cve.org/cverecord?id=CVE-2021-25748"
42+
}
43+
]
44+
}

0 commit comments

Comments
 (0)