Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in k8s.io/ingress-nginx: GHSA-hhpm-74pm-hf35 #1916

Closed
GoVulnBot opened this issue Jul 13, 2023 · 2 comments
Closed
Assignees
Labels
excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module.

Comments

@GoVulnBot
Copy link

In GitHub Security Advisory GHSA-hhpm-74pm-hf35, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
k8s.io/ingress-nginx 0.28.0 < 0.28.0

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
    - module: k8s.io/ingress-nginx
      versions:
        - fixed: 0.28.0
      packages:
        - package: k8s.io/ingress-nginx
summary: ingress-nginx component for Kubernetes allows file overwrite
description: |-
    The Kubernetes ingress-nginx component prior to version 0.28.0 allows a user
    with the ability to create namespaces and to read and create ingress objects to
    overwrite the password file of another ingress which uses
    nginx.ingress.kubernetes.io/auth-type: basic and which has a hyphenated
    namespace or secret name.
cves:
    - CVE-2020-8553
ghsas:
    - GHSA-hhpm-74pm-hf35
references:
    - web: https://nvd.nist.gov/vuln/detail/CVE-2020-8553
    - report: https://github.com/kubernetes/ingress-nginx/issues/5126
    - advisory: https://github.com/advisories/GHSA-hhpm-74pm-hf35

@neild neild self-assigned this Jul 25, 2023
@neild neild added the excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module. label Jul 25, 2023
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/513195 mentions this issue: data/excluded: batch add 26 excluded reports

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/592761 mentions this issue: data/reports: unexclude 75 reports

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
Projects
None yet
Development

No branches or pull requests

3 participants