CVE-2022-24878Path Traversal in Fluxcd Flux2

Severity
6.5MEDIUMNVD
CNA7.7
EPSS
0.3%
top 45.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 6
Latest updateAug 21

Description

Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to cause a Denial of Service at the controller level. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. Users are recommended to upgrade.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages5 packages

NVDfluxcd/flux2< 0.29.0
Gogithub.com/fluxcd_flux20.19.00.29.0
CVEListV5fluxcd/flux2flux2 < v0.28.5, >= v0.19.0, kustomize < v0.29.0, >= v0.16.0+1

🔴Vulnerability Details

4
OSV
Improper path handling in Kustomization files allows for denial of service in github.com/fluxcd/flux22024-08-21
GHSA
Improper path handling in Kustomization files allows for denial of service2022-05-20
OSV
Improper path handling in Kustomization files allows for denial of service2022-05-20
CVEList
Improper path handling in Kustomization files allows for denial of service2022-05-06
CVE-2022-24878 — Path Traversal in Fluxcd Flux2 | cvebase