Vulnerabilities > Kubernetes > Ingress Nginx > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-10-25 | CVE-2022-4886 | Unspecified vulnerability in Kubernetes Ingress-Nginx Ingress-nginx `path` sanitization can be bypassed with `log_format` directive. | 6.5 |
2023-05-24 | CVE-2021-25748 | Unspecified vulnerability in Kubernetes Ingress-Nginx A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `extensions` API group) to obtain the credentials of the ingress-nginx controller. | 6.5 |
2020-07-29 | CVE-2020-8553 | Externally Controlled Reference to a Resource in Another Sphere vulnerability in Kubernetes Ingress-Nginx The Kubernetes ingress-nginx component prior to version 0.28.0 allows a user with the ability to create namespaces and to read and create ingress objects to overwrite the password file of another ingress which uses nginx.ingress.kubernetes.io/auth-type: basic and which has a hyphenated namespace or secret name. | 5.9 |