René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

110 lines
5.1 KiB
JSON

{
"id": "CVE-2022-36035",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-08-31T15:15:08.767",
"lastModified": "2022-09-08T03:28:12.557",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Flux is a tool for keeping Kubernetes clusters in sync with sources of configuration (like Git repositories), and automating updates to configuration when there is new code to deploy. Flux CLI allows users to deploy Flux components into a Kubernetes cluster via command-line. The vulnerability allows other applications to replace the Flux deployment information with arbitrary content which is deployed into the target Kubernetes cluster instead. The vulnerability is due to the improper handling of user-supplied input, which results in a path traversal that can be controlled by the attacker. Users sharing the same shell between other applications and the Flux CLI commands could be affected by this vulnerability. In some scenarios no errors may be presented, which may cause end users not to realize that something is amiss. A safe workaround is to execute Flux CLI in ephemeral and isolated shell environments, which can ensure no persistent values exist from previous processes. However, upgrading to the latest version of the CLI is still the recommended mitigation strategy."
},
{
"lang": "es",
"value": "Flux es una herramienta para mantener los clusters Kubernetes sincronizados con las fuentes de configuraci\u00f3n (como los repositorios Git), y para automatizar las actualizaciones de la configuraci\u00f3n cuando se presenta nuevo c\u00f3digo que desplegar. Flux CLI permite a usuarios desplegar componentes de Flux en un cl\u00faster de Kubernetes por medio de la l\u00ednea de comandos. La vulnerabilidad permite que otras aplicaciones sustituyan la informaci\u00f3n de despliegue de Flux por contenido arbitrario que es desplegado en el cl\u00faster Kubernetes de destino. La vulnerabilidad es debido a un manejo inapropiado de la entrada suministrada por el usuario, lo que resulta en un recorrido de ruta que puede ser controlado por el atacante. Los usuarios que compartan el mismo shell entre otras aplicaciones y los comandos CLI de Flux podr\u00edan verse afectados por esta vulnerabilidad. En algunos escenarios no presentan errores, lo que puede causar que usuarios finales no den cuenta de que algo anda mal. Una mitigaci\u00f3n segura es ejecutar Flux CLI en entornos de shell ef\u00edmeros y aislados, lo que puede garantizar que no existan valores persistentes de procesos anteriores. Sin embargo, la actualizaci\u00f3n a la \u00faltima versi\u00f3n de la CLI sigue siendo la estrategia de mitigaci\u00f3n recomendada"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fluxcd:flux2:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.21.0",
"versionEndExcluding": "0.32.0",
"matchCriteriaId": "5FDD9888-4EB3-458E-9346-BBBE562FD3A1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/fluxcd/flux2/releases/tag/v0.32.0",
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
]
},
{
"url": "https://github.com/fluxcd/flux2/security/advisories/GHSA-xwf3-6rgv-939r",
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Third Party Advisory"
]
}
]
}