First published: Fri May 06 2022(Updated: )
Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to cause a Denial of Service at the controller level. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. Users are recommended to upgrade.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fluxcd Flux2 | <0.29.0 | |
Fluxcd Kustomize-controller | <0.24.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24878 is a vulnerability in Flux, an open and extensible continuous delivery solution for Kubernetes, that allows an attacker to cause a Denial of Service at the controller level through Path Traversal in the kustomize-controller using a malicious `kustomization.yaml` file.
The severity of CVE-2022-24878 is high with a CVSS score of 6.5.
Fluxcd Flux2 versions up to and exclusive of 0.29.0 and Fluxcd Kustomize-controller versions up to and exclusive of 0.24.0 are affected by CVE-2022-24878.
To mitigate CVE-2022-24878, you can implement automated tooling in your CI/CD pipeline to validate and sanitize `kustomization.yaml` files before they are processed by the kustomize-controller.
You can find more information about CVE-2022-24878 in the official GitHub Security Advisory: [GitHub Advisory](https://github.com/fluxcd/flux2/security/advisories/GHSA-7pwf-jg34-hxwp)