Github.Com Fluxcd Source-Controller vulnerabilities
2 known vulnerabilities affecting github.com/fluxcd_source-controller.
Total CVEs
2
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2024-31216MEDIUM≥ 0, < 1.2.52024-05-15
CVE-2024-31216 [MEDIUM] CWE-532 source-controller leaks Azure Storage SAS token into logs
source-controller leaks Azure Storage SAS token into logs
### Impact
When source-controller is configured to use an [Azure SAS token](https://v2-2.docs.fluxcd.io/flux/components/source/buckets/#azure-blob-sas-token-example) when connecting to Azure Blob Storage, the token was logged along with the Azure URL when the controller encountered a connection error. An attacker with access to the source-controlle
ghsaosv
CVE-2022-39272MEDIUM≥ 0.0.1-alpha-1, < 0.30.02022-10-19
CVE-2022-39272 [MEDIUM] CWE-20 Improper use of metav1.Duration allows for Denial of Service
Improper use of metav1.Duration allows for Denial of Service
Flux controllers within the affected versions range are vulnerable to a denial of service attack. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire
ghsaosv