CVE-2024-7646

HIGH

Ingress-Nginx - Command Injection

Title source: llm
STIX 2.1

Description

A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.

Exploits (2)

nomisec WORKING POC 1 stars
by dovics · poc
https://github.com/dovics/cve-2024-7646
nomisec WORKING POC
by r0binak · poc
https://github.com/r0binak/CVE-2024-7646

Scores

CVSS v3 8.8
EPSS 0.2576
EPSS Percentile 96.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-20
Status published
Products (4)
Kubernetes/ingress-nginx < 1.10.4
Kubernetes/ingress-nginx 1.10.4
Kubernetes/ingress-nginx 1.11.0 - 1.11.2
Kubernetes/ingress-nginx 1.11.2
Published Aug 16, 2024
Tracked Since Feb 18, 2026