Lucene search

K
githubGitHub Advisory DatabaseGHSA-FWR2-64VR-XV9M
HistorySep 11, 2023 - 12:59 p.m.

Argo CD cluster secret might leak in cluster details page

2023-09-1112:59:30
CWE-200
CWE-532
GitHub Advisory Database
github.com
19
information security
argo cd
cluster secrets
kubernetes
api
rbac access
patch
workaround
annotation

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

EPSS

0.001

Percentile

40.0%

Impact

Argo CD Cluster secrets might be managed declaratively using Argo CD / kubectl apply. As a result, the full secret body is stored inkubectl.kubernetes.io/last-applied-configuration annotation.

https://github.com/argoproj/argo-cd/pull/7139 introduced the ability to manage cluster labels and annotations. Since clusters are stored as secrets it also exposes the kubectl.kubernetes.io/last-applied-configuration annotation which includes full secret body. In order to view the cluster annotations via the Argo CD API, the user must have clusters, get RBAC access.

Note: In many cases, cluster secrets do not contain any actually-secret information. But sometimes, as in bearer-token auth, the contents might be very sensitive.

Patches

The bug has been patched in the following versions:

  • 2.8.3
  • 2.7.14
  • 2.6.15

Workarounds

Update/Deploy cluster secret with server-side-apply flag which does not use or rely on kubectl.kubernetes.io/last-applied-configuration annotation. Note: annotation for existing secrets will require manual removal.

For more information

Affected configurations

Vulners
Node
github.com\/argoproj\/argocd\/v2Range<2.8.3
OR
github.com\/argoproj\/argocd\/v2Range<2.7.14
OR
github.com\/argoproj\/argocd\/v2Range<2.6.15
VendorProductVersionCPE
github.com\/argoproj\/argocd\/v2*cpe:2.3:a:github.com\/argoproj\/argo:cd\/v2:*:*:*:*:*:*:*:*

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

EPSS

0.001

Percentile

40.0%