CVE-2022-24878
Flux Kustomize Controller vulnerability analysis and mitigation

Overview

Flux is an open and extensible continuous delivery solution for Kubernetes. The vulnerability (CVE-2022-24878) involves a Path Traversal issue in the kustomize-controller that can be exploited through a malicious kustomization.yaml file, potentially causing a Denial of Service at the controller level. The vulnerability affects versions prior to kustomize-controller v0.24.0 and flux2 v0.29.0 (Flux Advisory).

Technical details

The vulnerability is classified as High severity with a CVSS v3.1 base score of 7.7. The attack vector is Network-based with Low attack complexity and requires Low privileges with No user interaction. The vulnerability has a Changed scope impact, with No impact on Confidentiality and Integrity, but High impact on Availability. The issue is categorized under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) (NVD, GitHub Advisory).

Impact

In multi-tenancy deployments, this vulnerability can lead to multiple tenants being unable to apply their Kustomizations until the malicious kustomization.yaml is removed and the controller is restarted. A malicious user with write access to a Flux source can craft a specially designed kustomization.yaml file that causes the controller to enter an endless loop, effectively creating a denial of service condition (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. Users are strongly recommended to upgrade to these versions or newer. As a workaround, automated tooling can be implemented in the user's CI/CD pipeline to validate that kustomization.yaml files conform with specific policies (NVD).

Community reactions

The Flux Security Team disclosed this vulnerability along with two other security issues in May 2022. The community response led to improved security measures and documentation around multi-tenancy deployments. The Flux team has been actively engaging with the CNCF TAG Security for independent security review and recommendations, particularly around multi-tenancy implementations (Flux Advisory).

Additional resources


SourceThis report was generated using AI

Related Flux Kustomize Controller vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2022-24817CRITICAL9.9
  • Flux Kustomize ControllerFlux Kustomize Controller
  • cpe:2.3:a:fluxcd:kustomize-controller
NoYesMay 06, 2022
CVE-2022-24877HIGH8.8
  • Flux Kustomize ControllerFlux Kustomize Controller
  • cpe:2.3:a:fluxcd:kustomize-controller
NoYesMay 06, 2022
CVE-2021-41254HIGH8.8
  • Flux Kustomize ControllerFlux Kustomize Controller
  • github.com/fluxcd/kustomize-controller
NoYesNov 12, 2021
CVE-2022-24878MEDIUM6.5
  • Flux Kustomize ControllerFlux Kustomize Controller
  • cpe:2.3:a:fluxcd:kustomize-controller
NoYesMay 06, 2022
CVE-2022-39272MEDIUM4.3
  • Flux Kustomize ControllerFlux Kustomize Controller
  • cpe:2.3:a:fluxcd:kustomize-controller
NoYesOct 22, 2022

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management