{"id":"CVE-2022-24877","summary":"Improper path handling in kustomization files allows path traversal","details":"Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to expose sensitive data from the controller’s pod filesystem and possibly privilege escalation in multi-tenancy deployments. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0.","aliases":["BIT-flux-2022-24877","BIT-kustomize-2022-24877","GHSA-j77r-2fxf-5jrw","GO-2022-0447"],"modified":"2026-03-13T05:35:46.411284Z","published":"2022-05-06T01:10:09Z","related":["CGA-g8qj-2985-6m93"],"database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24877.json","cwe_ids":["CWE-22","CWE-36"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24877.json"},{"type":"ADVISORY","url":"https://github.com/fluxcd/flux2/security/advisories/GHSA-j77r-2fxf-5jrw"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24877"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fluxcd/flux2","events":[{"introduced":"0"},{"fixed":"adf5a5278f164834a29453f47d5281d2616c07e5"}]}],"versions":["v0.0.1","v0.0.1-alpha.1","v0.0.1-beta.1","v0.0.1-beta.2","v0.0.1-beta.3","v0.0.1-beta.4","v0.0.10","v0.0.11","v0.0.12","v0.0.13","v0.0.14","v0.0.15","v0.0.16","v0.0.17","v0.0.18","v0.0.19","v0.0.2","v0.0.20","v0.0.21","v0.0.22","v0.0.23","v0.0.24","v0.0.25","v0.0.26","v0.0.27","v0.0.28","v0.0.3","v0.0.4","v0.0.5","v0.0.6","v0.0.7","v0.0.8","v0.0.9","v0.1.0","v0.1.1","v0.1.2","v0.1.3","v0.1.4","v0.1.5","v0.1.6","v0.1.7","v0.1.8","v0.10.0","v0.11.0","v0.12.0","v0.12.1","v0.12.2","v0.12.3","v0.13.0","v0.13.1","v0.13.2","v0.13.3","v0.13.4","v0.14.0","v0.14.1","v0.14.2","v0.15.0","v0.15.1","v0.15.2","v0.15.3","v0.16.0","v0.16.1","v0.16.2","v0.17.0","v0.17.1","v0.17.2","v0.18.0","v0.18.1","v0.18.2","v0.18.3","v0.19.0","v0.19.1","v0.2.0","v0.2.1","v0.2.2","v0.2.3","v0.2.4","v0.2.5","v0.2.6","v0.20.0","v0.20.1","v0.21.0","v0.21.1","v0.22.0","v0.22.1","v0.23.0","v0.3.0","v0.4.0","v0.4.1","v0.4.2","v0.4.3","v0.5.0","v0.5.1","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.6","v0.5.7","v0.5.8","v0.5.9","v0.6.0","v0.6.1","v0.6.2","v0.6.3","v0.7.0","v0.7.1","v0.7.2","v0.7.3","v0.7.4","v0.7.5","v0.7.6","v0.7.7","v0.8.0","v0.8.1","v0.8.2","v0.9.0","v0.9.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24877.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}