CVE-2023-5043
HIGH
Published 2023-10-25T19:18:57.704Z
Actions:
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2023-5043. We'll provide specific mitigation strategies based on your environment and risk profile.
CVSS Score
V3.1
7.6
/10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2025.03.14
0.033
probability
of exploitation in the wild
There is a 3.3% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-06-25
Exploit Probability
Percentile: 0.866
Higher than 86.6% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
Ingress nginx annotation injection causes arbitrary command execution.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
✓ GitHub Reviewed
HIGH
Ingress nginx annotation injection causes arbitrary command execution
GHSA-5wj4-wffq-3378Advisory Details
### Issue Details
A security issue was identified in ingress-nginx where the nginx.ingress.kubernetes.io/configuration-snippet annotation on an Ingress object (in the networking.k8s.io or extensions API group) can be used to inject arbitrary commands, and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
This issue has been rated High (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L), and assigned CVE-2023-5043.
### Affected Components and Configurations
This bug affects ingress-nginx. If you do not have ingress-nginx installed on your cluster, you are not affected. You can check this by running kubectl get po -n ingress-nginx.
If you are running the “chrooted” ingress-nginx controller introduced in v1.2.0 (gcr.io/k8s-staging-ingress-nginx/controller-chroot), command execution is possible but credential extraction is not, so the High severity does not apply.
Multi-tenant environments where non-admin users have permissions to create Ingress objects are most affected by this issue.
#### Affected Versions
<v1.9.0
#### Versions allowing mitigation
v1.9.0
### Mitigation
Ingress Administrators should set the --enable-annotation-validation flag to enforce restrictions on the contents of ingress-nginx annotation fields.
### Detection
If you find evidence that this vulnerability has been exploited, please contact [email protected]
### Additional Details
See ingress-nginx Issue [#10571](https://github.com/kubernetes/ingress-nginx/issues/10571) for more details.
### Acknowledgements
This vulnerability was reported by suanve
Thank You,
CJ Cullen on behalf of the Kubernetes Security Response Committee
Affected Packages
Go
k8s.io/ingress-nginx
ECOSYSTEM:
≥0
<1.9.0
CVSS Scoring
CVSS Score
7.5
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
References
Advisory provided by GitHub Security Advisory Database. Published: October 25, 2023, Modified: February 13, 2025
References
Published: 2023-10-25T19:18:57.704Z
Last Modified: 2025-02-13T17:19:26.664Z
Copied to clipboard!