Логотип exploitDog
bind:CVE-2022-24878
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-24878

Количество 2

Количество 2

nvd логотип

CVE-2022-24878

почти 4 года назад

Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to cause a Denial of Service at the controller level. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. Users are recommended to upgrade.

CVSS3: 7.7
EPSS: Низкий
github логотип

GHSA-7pwf-jg34-hxwp

больше 3 лет назад

Improper path handling in Kustomization files allows for denial of service

CVSS3: 7.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-24878

Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to cause a Denial of Service at the controller level. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. Users are recommended to upgrade.

CVSS3: 7.7
0%
Низкий
почти 4 года назад
github логотип
GHSA-7pwf-jg34-hxwp

Improper path handling in Kustomization files allows for denial of service

CVSS3: 7.7
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу