
CVE-2022-39272 – Flux2 vulnerable to Denial of Service due to Improper use of metav1.Duration
https://notcve.org/view.php?id=CVE-2022-39272
21 Oct 2022 — Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0 are subject to a Denial of Service. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed. This issue is patched in version 0.35.0. As a workaround, Admission controllers can be emp... • https://github.com/fluxcd/flux2/security/advisories/GHSA-f4p5-x4vc-mh4v • CWE-1284: Improper Validation of Specified Quantity in Input •

CVE-2022-24878 – Improper path handling in Kustomization files allows for denial of service
https://notcve.org/view.php?id=CVE-2022-24878
06 May 2022 — Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to cause a Denial of Service at the controller level. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. Users are recommended to upgrade. • https://github.com/fluxcd/flux2/security/advisories/GHSA-7pwf-jg34-hxwp • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2022-24877 – Improper path handling in kustomization files allows path traversal
https://notcve.org/view.php?id=CVE-2022-24877
06 May 2022 — Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to expose sensitive data from the controller’s pod filesystem and possibly privilege escalation in multi-tenancy deployments. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included ... • https://github.com/fluxcd/flux2/security/advisories/GHSA-j77r-2fxf-5jrw • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-36: Absolute Path Traversal •

CVE-2021-41254 – Privilege escalation to cluster admin on multi-tenant environments
https://notcve.org/view.php?id=CVE-2021-41254
12 Nov 2021 — kustomize-controller is a Kubernetes operator, specialized in running continuous delivery pipelines for infrastructure and workloads defined with Kubernetes manifests and assembled with Kustomize. Users that can create Kubernetes Secrets, Service Accounts and Flux Kustomization objects, could execute commands inside the kustomize-controller container by embedding a shell script in a Kubernetes Secret. This can be used to run `kubectl` commands under the Service Account of kustomize-controller, thus allowing... • https://github.com/fluxcd/kustomize-controller/security/advisories/GHSA-35rf-v2jv-gfg7 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •