NA

CVE-2023-5044

Published: 25/10/2023 Updated: 07/03/2024
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kubernetes ingress-nginx

Vendor Advisories

Check Point Reference: CPAI-2023-1169 Date Published: 20 Nov 2023 Severity: High ...

Github Repositories

Poc for CVE 2023 5044

CVE-2023-5044 Poc for CVE 2023 5044 Prerequisites Kind: v0200 Kubectl: v1293 Docker: v2600 PoC Gi Docker riktige rettigheter sudo usermod -aG docker $USER && newgrp docker Start klusteret med extraPortMapping og node-labels for å klargjøre klusteret til å kjøre en ingress cat <&lt

CVE-2023-5044 Ingress Nginx Exploit Proof-Of-Concept This is a quick Go program to exploit the recent CVE in the Ingress Nginx controller Details on how to do this are already out there via Rory McCune's blog at raesenegithubio/blog/2023/10/29/exploiting-CVE-2023-5044/, this just automates the process a little and tidies up the exploit so that it is a more flexi

PoC CVE-2023-5044

CVE-2023-5044 Code injection via nginxingresskubernetesio/permanent-redirect annotation Firstly, you need deploy Pod & Service: kind: Pod apiVersion: v1 metadata: name: apple-app labels: app: apple spec: containers: - name: apple-app image: hashicorp/http-echo args: - "-text=apple" --- kind: Service apiVersion: v1 metadata:

Recent Articles

Unpatched NGINX ingress controller bugs can be abused to steal Kubernetes cluster secrets
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Just tricks, no treats with these 3 vulns

Three unpatched high-severity bugs in the NGINX ingress controller can be abused by miscreants to steal credentials and other secrets from Kubernetes clusters.  The vulnerabilities, tracked as CVE-2023-5043, CVE-2023-5044 and CVE-2022-4886, were disclosed on October 27, and are listed as currently awaiting triage. It's unclear if any of the flaws have been exploited. The Register did not immediately receive a response to questions, including if the bugs have been found and exploited and whe...