The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/haproxytech/kubernetes-ingress/pkg to version 3.1.13 or higher.
Affected versions of this package are vulnerable to Incomplete Filtering of Special Elements in the config-snippets feature flag. An attacker can access sensitive environment variables, including the Kubernetes service account token secret, by injecting arbitrary HAProxy directives.
Note:
This is only exploitable if the attacker has privileges to create or modify Ingress or Service objects in a Kubernetes cluster and the affected product both ships the base HAProxy RPM and runs it in the Kubernetes Ingress Controller.
The fixed versions of HAProxy Enterprise Kubernetes Ingress Controller are 3.0.16-ee1, 1.11.13-ee1 and 1.9.15-ee1.
Starting with version 3.2 of the HAProxy Kubernetes Ingress Controller, the config-snippets feature will be disabled by default and will become an opt-in capability.
This vulnerability can be mitigated by disabling the config-snippets feature before starting the Ingress Controller using the --disable-config-snippets flag.