CVE-2022-24878
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
06/05/2022
Last modified:
14/05/2022
Description
Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to cause a Denial of Service at the controller level. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. Users are recommended to upgrade.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:fluxcd:flux2:*:*:*:*:*:*:*:* | 0.29.0 (excluding) | |
| cpe:2.3:a:fluxcd:kustomize-controller:*:*:*:*:*:*:*:* | 0.24.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



