CVE-2022-24878 — Path Traversal in Fluxcd Flux2
Severity
6.5MEDIUMNVD
CNA7.7
EPSS
0.3%
top 45.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 6
Latest updateAug 21
Description
Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to cause a Denial of Service at the controller level. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. Users are recommended to upgrade.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6
Affected Packages5 packages
🔴Vulnerability Details
4OSV▶
Improper path handling in Kustomization files allows for denial of service in github.com/fluxcd/flux2↗2024-08-21