Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2026/VULN319
_____________________________________________________________________

DATE                : 20/03/2026

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running ingress-nginx versions prior
                           to 1.13.9, 1.14.5, 1.15.1.

=====================================================================
https://groups.google.com/g/kubernetes-security-announce/c/hIAkgZb8MJ0
_____________________________________________________________________


[Security Advisory] CVE-2026-4342: ingress-nginx comment-based nginx
configuration injection

Tabitha Sable

19 mars 2026, 18:45:22
à kubernete...@googlegroups.com,dev,kubernetes-sec...@googlegroups.com,
kubernetes-se...@googlegroups.com,distributo...@kubernetes.io


Hello Kubernetes Community,

A security issue was discovered in ingress-nginx where a combination of
Ingress annotations can be used to inject configuration into nginx. This
can lead to arbitrary code execution in the context of the ingress-nginx
controller, and disclosure of Secrets accessible to the controller.
(Note that in the default installation, the controller can access all
Secrets cluster-wide.)

This issue has been rated **HIGH** ([CVSS calculator]
(https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), score: 8.8),
and assigned **CVE-2026-4342**

### Am I vulnerable?

This issue affects ingress-nginx. If you do not have ingress-nginx
installed on your cluster, you are not affected. You can check this by
running `kubectl get pods --all-namespaces --selector app.kubernetes.io/name=ingress-nginx`.


#### Affected Versions

- ingress-nginx: < v1.13.9
- ingress-nginx: < v1.14.5
- ingress-nginx: < v1.15.1

### How do I mitigate this vulnerability?



#### Fixed Versions

- ingress-nginx: v1.13.9
- ingress-nginx: v1.14.5
- ingress-nginx: v1.15.1

#### How to upgrade?

To upgrade, refer to the documentation: [Upgrading Ingress-nginx]
(https://kubernetes.github.io/ingress-nginx/deploy/upgrade/)

### Detection

Suspicious data within the `rules.http.paths.path` field of an Ingress
resource could indicate an attempt to exploit this vulnerability.

If you find evidence that this vulnerability has been exploited, please
contact secu...@kubernetes.io

See the GitHub issue for more details:
https://github.com/kubernetes/kubernetes/issues/137893

#### Acknowledgements

This vulnerability was reported by wooseokdotkim.

Thank You,

Tabitha Sable on behalf of the Kubernetes Security Response Committee

=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




