Miggo Logo

CVE-2025-24513:
ingress-nginx controller - auth secret file path traversal vulnerability

4.8

CVSS Score

Basic Information

EPSS Score
-
Published
3/25/2025
Updated
3/25/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
k8s.io/ingress-nginxgo
k8s.io/ingress-nginxgo

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path handling in the Admission Controller's secret management. The functions responsible for creating auth secret files and validating secret references would be the primary points where user-controlled input (secret names) are incorporated into file paths without adequate sanitization. The CWE-20 and CWE-22 mapping directly indicates missing input validation for path construction. The pattern matches common path traversal vulnerabilities where user-supplied data is used in file operations without sanitization.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* s**urity issu* w*s *is*ov*r** in [in*r*ss-n*inx](*ttps://*it*u*.*om/ku**rn*t*s/in*r*ss-n*inx) w**r* *tt**k*r-provi*** **t* *r* in*lu*** in * *il*n*m* *y t** in*r*ss-n*inx **mission *ontroll*r ***tur*, r*sultin* in *ir**tory tr*v*rs*l wit*in t** *on

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* **n*lin* in t** **mission *ontroll*r's s**r*t m*n***m*nt. T** *un*tions r*sponsi*l* *or *r**tin* *ut* s**r*t *il*s *n* v*li**tin* s**r*t r***r*n**s woul* ** t** prim*ry points w**r* us*r-*ontroll** input (s*