Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in k8s.io/ingress-nginx: GHSA-pvmg-xgmx-9mxh #613

Closed
julieqiu opened this issue Aug 1, 2022 · 2 comments
Closed
Assignees
Labels
excluded: NOT_IMPORTABLE This vulnerability only exists in a binary and is not importable.

Comments

@julieqiu
Copy link
Member

julieqiu commented Aug 1, 2022

In GitHub Security Advisory GHSA-pvmg-xgmx-9mxh, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
k8s.io/ingress-nginx 1.2.0 < 1.2.0

See doc/triage.md for instructions on how to triage this report.

packages:
  - package: k8s.io/ingress-nginx
    versions:
      - fixed: 1.2.0
description: A security issue was discovered in ingress-nginx where a user that can
    create or update ingress objects can use the spec.rules[].http.paths[].path field
    of an Ingress object (in the networking.k8s.io or extensions API group) to obtain
    the credentials of the ingress-nginx controller. In the default configuration,
    that credential has access to all secrets in the cluster.
published: 2022-05-07T00:00:49Z
last_modified: 2022-06-15T19:46:00Z
cves:
  - CVE-2021-25745
ghsas:
  - GHSA-pvmg-xgmx-9mxh
links:
    context:
      - https://github.com/advisories/GHSA-pvmg-xgmx-9mxh

@neild
Copy link
Contributor

neild commented Aug 9, 2022

Vulnerability in tool.

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/592769 mentions this issue: data/reports: unexclude 50 reports

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
excluded: NOT_IMPORTABLE This vulnerability only exists in a binary and is not importable.
Projects
None yet
Development

No branches or pull requests

3 participants