-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| k8s.io/ingress-nginx | go | ||
| k8s.io/ingress-nginx | go |
The vulnerability stems from improper handling of user-controlled annotations (mirror-target/mirror-host) that are directly injected into nginx config. The mirror.Apply function is specifically responsible for processing these mirror-related annotations, and the parser.parseString function likely handles raw annotation values without proper validation. These functions would fail to sanitize input, allowing attackers to inject arbitrary nginx directives through annotation values. The CWE-20 (input validation) and CWE-15 (configuration control) mappings strongly suggest missing validation in annotation processing code paths.