Fluxcd Kustomize-Controller vulnerabilities
5 known vulnerabilities affecting fluxcd/kustomize-controller.
Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2022-39272MEDIUMCVSS 4.3≥ 0.0.2, < 0.29.0v0.0.12022-10-22
CVE-2022-39272 [MEDIUM] CWE-1284 CVE-2022-39272: Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0
Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0 are subject to a Denial of Service. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of
nvd
CVE-2022-24817CRITICALCVSS 9.9≥ 0.1.0, < 0.23.02022-05-06
CVE-2022-24817 [CRITICAL] CWE-94 CVE-2022-24817: Flux2 is an open and extensible continuous delivery solution for Kubernetes. Flux2 versions between
Flux2 is an open and extensible continuous delivery solution for Kubernetes. Flux2 versions between 0.1.0 and 0.29.0, helm-controller 0.1.0 to v0.19.0, and kustomize-controller 0.1.0 to v0.23.0 are vulnerable to Code Injection via malicious Kubeconfig. In multi-tenancy deployments this can also lead to privilege escalation if the controller's servic
nvd
CVE-2022-24877HIGHCVSS 8.8fixed in 0.24.02022-05-06
CVE-2022-24877 [HIGH] CWE-22 CVE-2022-24877: Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the ku
Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to expose sensitive data from the controller’s pod filesystem and possibly privilege escalation in multi-tenancy deployments. Workarounds include automated tooling in the user's C
nvd
CVE-2022-24878MEDIUMCVSS 6.5fixed in 0.24.02022-05-06
CVE-2022-24878 [MEDIUM] CWE-22 CVE-2022-24878: Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the ku
Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to cause a Denial of Service at the controller level. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with spec
nvd
CVE-2021-41254HIGHCVSS 8.8fixed in 0.15.02021-11-12
CVE-2021-41254 [HIGH] CWE-78 CVE-2021-41254: kustomize-controller is a Kubernetes operator, specialized in running continuous delivery pipelines
kustomize-controller is a Kubernetes operator, specialized in running continuous delivery pipelines for infrastructure and workloads defined with Kubernetes manifests and assembled with Kustomize. Users that can create Kubernetes Secrets, Service Accounts and Flux Kustomization objects, could execute commands inside the kustomize-controller container by
cvelistv5nvd