¿ì²¥ÊÓÆµ

Skip to main content Skip to local navigation

Ingress NGINX Configuration Injection Vulnerability (CVE-2026-24512)

 

A picture containing text  Description automatically generated

 

Information Security Advisory


A recently discovered vulnerability in the Kubernetes ingress-nginx controller (CVE‑2026‑24512) allows attackers to execute arbitrary code by exploiting improper sanitization of user‑supplied ingress path data.

Severity level
 
CVSS Score: 8.8/high

Description
:
Ingress‑NGINX is a widely used open‑source Kubernetes ingress controller responsible for managing inbound traffic to cluster services.
A vulnerability exists in ingress‑nginx where the rules.http.paths.path field fails to properly validate user‑defined input. This flaw allows attackers to inject rogue NGINX configuration directives, enabling arbitrary code execution within the ingress‑nginx controller container.

Affected Versions
:
All ingress-nginx versions prior to v1.13.7 and prior v1.14.3 are affected.

Impact:
Successful exploitation allows attackers to execute arbitrary code inside the ingress-nginx controller.

Resolution:
Upgrade to the version 1.13.7, 1.14.3 or later immediately.

Mitigation:
Deploy a validating admission controller that rejects Ingress resources using the ImplementationSpecific path type, blocking the attack vector.

Reference:

 

 

 


Information Security
 

Contact

IT Client Services at askIT@yorku.ca or 416 736 5800

 

 

PRIVACY POLICY | VISIT WWW.YORKU.CA
This email was sent by: ¿ì²¥ÊÓÆµ, 4700 Keele Street, Toronto, Ontario M3J 1P3

This email is viewed best in Microsoft Outlook for web