Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

NGINX ingress Security Flaw-Attackers Kubernetes API server

admin by admin
Oct 30, 2023
in News
A A
0

Three vulnerabilities have been discovered in NGINX ingress controllers, which were associated with arbitrary command execution, code injection, and sanitization bypass. The severity of these vulnerabilities ranges between 7.6 (High) and 10.0 (Critical).

NGINX Ingress Controller can be used to manage the routing mechanism using the widely known NGINX reverse proxy server. However, Kubernetes is an API object that provides HTTP and HTTPS routing to services depending on a set of rules, including hostnames or URL paths.

EHA

This vulnerability exists in the nginx.ingress.kubernetes.io/configuration-snippet annotation on an Ingress object, which can be used to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. The default ingress-nginx controller has access to all secrets in the Kubernetes cluster.

However, this vulnerability does not affect if there are no ingress-nginx installations on the cluster. To check this vulnerability, kubectl get po -n ingress-nginx command can be used.

This vulnerability also exists in the nginx.ingress.kubernetes.io/configuration-snippet annotation on an Ingress object, which can be used to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. The above command can be used to check if the affected cluster is vulnerable. The severity of this vulnerability has been given as 7.6 (High).

The reason the above two vulnerabilities exist is due to the fact that there are multiple scenarios such as Multi-tenant clusters, Malicious configurations from untrusted sources, Using configurations from the web or ChatGPT, or Insider who has change rights to configurations, but no access to the cluster.

CVE-2022-4886: Ingress-nginx Path Sanitization

A threat actor with user privilege can create or update ingress objects and use directives to bypass the sanitization of the spec.rules[].http.paths[].path field of an Ingress object in order to obtain the credentials of the ingress-nginx controller.

However, as per the default configuration, this credential has access to all secrets in the cluster. The severity of this vulnerability has been given as 6.7 (Medium).

A complete report about these vulnerabilities has been published by Armosec, which provides detailed information about the vulnerabilities that NGINX disclosed on GitHub.

Affected Products

According to the reports shared with Cyber Security News, the affected products are versions earlier than v1.9.0. Moreover, NGINX has released patches for fixing this vulnerability in their latest version, v1.9.0. 

To mitigate this vulnerability, users are recommended to set the –enable-annotation-validation flag, which enforces restrictions on the contents of ingress-nginx annotation fields.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.