CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
EPSS
Percentile
30.3%
All versions of Argo CD starting from v2.6.0 have a bug where open web terminal sessions do not expire. This bug allows users to send any websocket messages even if the token has already expired. The most straightforward scenario is when a user opens the terminal view and leaves it open for an extended period. This allows the user to view sensitive information even when they should have been logged out already.
A patch for this vulnerability has been released in the following Argo CD version:
The only way to completely resolve the issue is to upgrade.
Disable web-based terminal or define RBAC rules to it
https://argo-cd.readthedocs.io/en/latest/operator-manual/web_based_terminal/
If you have any questions or comments about this advisory:
Thank you to bean.zhang (@zhlu32 ) of HIT-IDS ChunkL Team who discovered the issue and reported it confidentially according to our guidelines.
Vendor | Product | Version | CPE |
---|---|---|---|
github.com\/argoproj\/argo | cd | 2.8.0 | cpe:2.3:a:github.com\/argoproj\/argo:cd:2.8.0:*:*:*:*:*:*:* |
github.com\/argoproj\/argo | cd | * | cpe:2.3:a:github.com\/argoproj\/argo:cd:*:*:*:*:*:*:*:* |