Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade k8s.io/ingress-nginx/internal/ingress/annotations/auth
to version 1.11.5, 1.12.1 or higher.
Affected versions of this package are vulnerable to Improper Isolation or Compartmentalization in the Validating Admission Controller feature. An attacker with access to the pod network can execute code, which allows them to access stored secrets. By default, the controller can access all cluster secrets. Using this, the attacker can elevate privileges for arbitrary code execution.
This vulnerability can be avoided by disabling the Validating Admission Controller feature. This is controlled via the Helm setting controller.admissionWebhooks.enabled=false
or by taking the following actions for a manual deployment:
Delete the ValidatingWebhookconfiguration
called ingress-nginx-admission
.
Edit the ingress-nginx-controller
Deployment or Daemonset, removing --validating-webhook
from the controller container’s argument list