The vulnerability exists in how the Skipper Ingress controller handles Kubernetes services of type ExternalName. An attacker with permissions to create Ingress resources could define a service of type ExternalName that points to an internal service. Skipper would then create a route to this internal service, leading to a Server-Side Request Forgery (SSRF) vulnerability. The patch, identified in commit a4c87ce029a58eb8e1c2c1f93049194a39cf6219, introduces a new configuration flag, enable-kubernetes-external-names, which is set to false by default. This change disables the processing of ExternalName services unless an administrator explicitly enables it. The analysis of the patch identified two key functions, kubernetes.convertPathRuleV1 and kubernetes.ingress.convertDefaultBackendV1, in dataclients/kubernetes/ingressv1.go as the locations of the vulnerability. These functions were responsible for creating routes from Ingress definitions and, prior to the patch, lacked the necessary checks to prevent the misuse of ExternalName services. The patch adds a conditional check in both functions to ensure that ExternalName services are only processed if the new flag is enabled.