Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-39272
HistoryOct 21, 2022 - 12:00 a.m.

CVE-2022-39272 Flux2 vulnerable to Denial of Service due to Improper use of metav1.Duration

2022-10-2100:00:00
CWE-1284
GitHub_M
www.cve.org

5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.8%

Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0 are subject to a Denial of Service. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields .spec.interval or .spec.timeout (and structured variations of these fields), causing the entire object type to stop being processed. This issue is patched in version 0.35.0. As a workaround, Admission controllers can be employed to restrict the values that can be used for fields .spec.interval and .spec.timeout, however upgrading to the latest versions is still the recommended mitigation.

CNA Affected

[
  {
    "vendor": "fluxcd",
    "product": "flux2",
    "versions": [
      {
        "version": "< 0.35.0",
        "status": "affected"
      }
    ]
  }
]

5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.8%

Related for CVELIST:CVE-2022-39272