Логотип exploitDog
bind:CVE-2022-24877
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-24877

Количество 2

Количество 2

nvd логотип

CVE-2022-24877

почти 4 года назад

Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to expose sensitive data from the controller’s pod filesystem and possibly privilege escalation in multi-tenancy deployments. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0.

CVSS3: 9.9
EPSS: Низкий
github логотип

GHSA-j77r-2fxf-5jrw

почти 4 года назад

Improper path handling in kustomization files allows path traversal

CVSS3: 9.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-24877

Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to expose sensitive data from the controller’s pod filesystem and possibly privilege escalation in multi-tenancy deployments. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0.

CVSS3: 9.9
1%
Низкий
почти 4 года назад
github логотип
GHSA-j77r-2fxf-5jrw

Improper path handling in kustomization files allows path traversal

CVSS3: 9.9
1%
Низкий
почти 4 года назад

Уязвимостей на страницу