
CVE-2024-31216 – source-controller leaks theAzure Storage SAS token into logs on connection errors
https://notcve.org/view.php?id=CVE-2024-31216
15 May 2024 — The source-controller is a Kubernetes operator, specialised in artifacts acquisition from external sources such as Git, OCI, Helm repositories and S3-compatible buckets. The source-controller implements the source.toolkit.fluxcd.io API and is a core component of the GitOps toolkit. Prior to version 1.2.5, when source-controller was configured to use an Azure SAS token when connecting to Azure Blob Storage, the token was logged along with the Azure URL when the controller encountered a connection error. An a... • https://github.com/fluxcd/source-controller/commit/915d1a072a4f37dd460ba33079dc094aa6e72fa9 • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2022-39272 – Flux2 vulnerable to Denial of Service due to Improper use of metav1.Duration
https://notcve.org/view.php?id=CVE-2022-39272
21 Oct 2022 — Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0 are subject to a Denial of Service. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed. This issue is patched in version 0.35.0. As a workaround, Admission controllers can be emp... • https://github.com/fluxcd/flux2/security/advisories/GHSA-f4p5-x4vc-mh4v • CWE-1284: Improper Validation of Specified Quantity in Input •

CVE-2022-36049 – Flux2 Helm Controller denial of service
https://notcve.org/view.php?id=CVE-2022-36049
07 Sep 2022 — Flux2 is a tool for keeping Kubernetes clusters in sync with sources of configuration, and Flux's helm-controller is a Kubernetes operator that allows one to declaratively manage Helm chart releases. Helm controller is tightly integrated with the Helm SDK. A vulnerability found in the Helm SDK that affects flux2 v0.0.17 until v0.32.0 and helm-controller v0.0.4 until v0.23.0 allows for specific data inputs to cause high memory consumption. In some platforms, this could cause the controller to panic and stop ... • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=44996 • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2022-36035 – Flux CLI Workload Injection
https://notcve.org/view.php?id=CVE-2022-36035
31 Aug 2022 — Flux is a tool for keeping Kubernetes clusters in sync with sources of configuration (like Git repositories), and automating updates to configuration when there is new code to deploy. Flux CLI allows users to deploy Flux components into a Kubernetes cluster via command-line. The vulnerability allows other applications to replace the Flux deployment information with arbitrary content which is deployed into the target Kubernetes cluster instead. The vulnerability is due to the improper handling of user-suppli... • https://github.com/fluxcd/flux2/releases/tag/v0.32.0 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2022-24878 – Improper path handling in Kustomization files allows for denial of service
https://notcve.org/view.php?id=CVE-2022-24878
06 May 2022 — Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to cause a Denial of Service at the controller level. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. Users are recommended to upgrade. • https://github.com/fluxcd/flux2/security/advisories/GHSA-7pwf-jg34-hxwp • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2022-24877 – Improper path handling in kustomization files allows path traversal
https://notcve.org/view.php?id=CVE-2022-24877
06 May 2022 — Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to expose sensitive data from the controller’s pod filesystem and possibly privilege escalation in multi-tenancy deployments. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included ... • https://github.com/fluxcd/flux2/security/advisories/GHSA-j77r-2fxf-5jrw • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-36: Absolute Path Traversal •

CVE-2022-24817 – Improper kubeconfig validation allows arbitrary code execution
https://notcve.org/view.php?id=CVE-2022-24817
06 May 2022 — Flux2 is an open and extensible continuous delivery solution for Kubernetes. Flux2 versions between 0.1.0 and 0.29.0, helm-controller 0.1.0 to v0.19.0, and kustomize-controller 0.1.0 to v0.23.0 are vulnerable to Code Injection via malicious Kubeconfig. In multi-tenancy deployments this can also lead to privilege escalation if the controller's service account has elevated permissions. Workarounds include disabling functionality via Validating Admission webhooks by restricting users from setting the `spec.kub... • https://github.com/fluxcd/flux2/security/advisories/GHSA-vvmq-fwmg-2gjc • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2021-41254 – Privilege escalation to cluster admin on multi-tenant environments
https://notcve.org/view.php?id=CVE-2021-41254
12 Nov 2021 — kustomize-controller is a Kubernetes operator, specialized in running continuous delivery pipelines for infrastructure and workloads defined with Kubernetes manifests and assembled with Kustomize. Users that can create Kubernetes Secrets, Service Accounts and Flux Kustomization objects, could execute commands inside the kustomize-controller container by embedding a shell script in a Kubernetes Secret. This can be used to run `kubectl` commands under the Service Account of kustomize-controller, thus allowing... • https://github.com/fluxcd/kustomize-controller/security/advisories/GHSA-35rf-v2jv-gfg7 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •