{"id":"CVE-2024-7646","details":"A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.","aliases":["BIT-nginx-ingress-controller-2024-7646","GO-2024-3075"],"modified":"2026-03-15T22:51:55.291988Z","published":"2024-08-16T18:15:10.970Z","references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/08/16/5"},{"type":"WEB","url":"https://groups.google.com/g/kubernetes-security-announce/c/a1__cKjWkfA"},{"type":"REPORT","url":"https://github.com/kubernetes/kubernetes/issues/126744"},{"type":"FIX","url":"https://github.com/kubernetes/ingress-nginx/pull/11719"},{"type":"FIX","url":"https://github.com/kubernetes/ingress-nginx/pull/11721"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-7646.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}