Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| kubernetes | ingress-nginx | 0 ~ 1.11.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974). | https://github.com/hakaioffsec/IngressNightmare-PoC | POC Details |
| 2 | IngressNightmare-PoC: (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) PoC ,One-click script 。 一键脚本 | https://github.com/lufeirider/IngressNightmare-PoC | POC Details |
| 3 | A security issue was discovered in ingress-nginx https-//github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-1097.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-1974 | 9.8 CRITICAL | ingress-nginx admission controller RCE escalation |
| CVE-2025-24514 | 8.8 HIGH | ingress-nginx controller - configuration injection via unsanitized auth-url annotation |
| CVE-2025-1098 | 8.8 HIGH | ingress-nginx controller - configuration injection via unsanitized mirror annotations |
| CVE-2025-24513 | 4.8 MEDIUM | ingress-nginx controller - auth secret file path traversal vulnerability |
No comments yet