{"id":"CVE-2022-24878","summary":"Improper path handling in Kustomization files allows for denial of service","details":"Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to cause a Denial of Service at the controller level. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. Users are recommended to upgrade.","aliases":["BIT-flux-2022-24878","BIT-kustomize-2022-24878","GHSA-7pwf-jg34-hxwp","GO-2022-0448"],"modified":"2026-03-15T13:45:18.162206Z","published":"2022-05-06T01:35:08Z","database_specific":{"cwe_ids":["CWE-22"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24878.json","cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24878.json"},{"type":"ADVISORY","url":"https://github.com/fluxcd/flux2/security/advisories/GHSA-7pwf-jg34-hxwp"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24878"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fluxcd/flux2","events":[{"introduced":"0"},{"fixed":"5346c1cca31261453f1100b3516a77750e46bb17"},{"introduced":"0"},{"fixed":"adf5a5278f164834a29453f47d5281d2616c07e5"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.29.0"},{"introduced":"0"},{"fixed":"0.24.0"}]}}],"versions":["v0.0.1","v0.0.1-alpha.1","v0.0.1-beta.1","v0.0.1-beta.2","v0.0.1-beta.3","v0.0.1-beta.4","v0.0.10","v0.0.11","v0.0.12","v0.0.13","v0.0.14","v0.0.15","v0.0.16","v0.0.17","v0.0.18","v0.0.19","v0.0.2","v0.0.20","v0.0.21","v0.0.22","v0.0.23","v0.0.24","v0.0.25","v0.0.26","v0.0.27","v0.0.28","v0.0.3","v0.0.4","v0.0.5","v0.0.6","v0.0.7","v0.0.8","v0.0.9","v0.1.0","v0.1.1","v0.1.2","v0.1.3","v0.1.4","v0.1.5","v0.1.6","v0.1.7","v0.1.8","v0.10.0","v0.11.0","v0.12.0","v0.12.1","v0.12.2","v0.12.3","v0.13.0","v0.13.1","v0.13.2","v0.13.3","v0.13.4","v0.14.0","v0.14.1","v0.14.2","v0.15.0","v0.15.1","v0.15.2","v0.15.3","v0.16.0","v0.16.1","v0.16.2","v0.17.0","v0.17.1","v0.17.2","v0.18.0","v0.18.1","v0.18.2","v0.18.3","v0.19.0","v0.19.1","v0.2.0","v0.2.1","v0.2.2","v0.2.3","v0.2.4","v0.2.5","v0.2.6","v0.20.0","v0.20.1","v0.21.0","v0.21.1","v0.22.0","v0.22.1","v0.23.0","v0.24.0","v0.24.1","v0.25.0","v0.25.1","v0.25.2","v0.25.3","v0.26.0","v0.26.1","v0.26.2","v0.26.3","v0.27.0","v0.27.1","v0.27.2","v0.28.0","v0.28.1","v0.28.2","v0.28.3","v0.28.4","v0.28.5","v0.3.0","v0.4.0","v0.4.1","v0.4.2","v0.4.3","v0.5.0","v0.5.1","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.6","v0.5.7","v0.5.8","v0.5.9","v0.6.0","v0.6.1","v0.6.2","v0.6.3","v0.7.0","v0.7.1","v0.7.2","v0.7.3","v0.7.4","v0.7.5","v0.7.6","v0.7.7","v0.8.0","v0.8.1","v0.8.2","v0.9.0","v0.9.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24878.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}]}