CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
15.5%
I can convince the UI to let me do things with an invalid Application.
p, michael, applications, *, demo/*, allow
, where demo
can just deploy to the demo
namespacedev
which reconciles from ns dev-apps
p, michael, applications, sync, dev/*, allow
, i.e. no updating via the UI allowed, gitops-onlypwn
in dev-apps
with project dev and sync the app with sources from gitA patch for this vulnerability has been released in the following Argo CD versions:
v2.10.7
v2.9.12
v2.8.16
If you have any questions or comments about this advisory:
Open an issue in the Argo CD issue tracker or discussions
Join us on Slack in channel #argo-cd
This vulnerability was found & reported by @crenshaw-dev (Michael Crenshaw)
The Argo team would like to thank these contributors for their responsible disclosure and constructive communications during the resolve of this issue
github.com/advisories/GHSA-2gvw-w6fj-7m3c
github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c
github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5
github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17
github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c
nvd.nist.gov/vuln/detail/CVE-2024-31990
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
15.5%