Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4298 | Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to expose sensitive data from the controller’s pod filesystem and possibly privilege escalation in multi-tenancy deployments. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. |
Github GHSA |
GHSA-j77r-2fxf-5jrw | Improper path handling in kustomization files allows path traversal |
Wed, 23 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T18:29:38.832Z
Reserved: 2022-02-10T00:00:00.000Z
Link: CVE-2022-24877
Updated: 2024-08-03T04:29:00.196Z
Status : Modified
Published: 2022-05-06T01:15:09.387
Modified: 2024-11-21T06:51:18.167
Link: CVE-2022-24877
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA