CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
26.7%
All versions of ArgoCD starting from v2.4 have a bug where the ArgoCD repo-server component is vulnerable to a Denial-of-Service attack vector. Specifically, the said component extracts a user-controlled tar.gz file without validating the size of its inner files. As a result, a malicious, low-privileged user can send a malicious tar.gz file that exploits this vulnerability to the repo-server, thereby harming the system’s functionality and availability. Additionally, the repo-server is susceptible to another vulnerability due to the fact that it does not check the extracted file permissions before attempting to delete them. Consequently, an attacker can craft a malicious tar.gz archive in a way that prevents the deletion of its inner files when the manifest generation process is completed.
A patch for this vulnerability has been released in the following Argo CD versions:
The only way to completely resolve the issue is to upgrade.
Configure RBAC (Role-Based Access Control) and provide access for configuring applications only to a limited number of administrators. These administrators should utilize trusted and verified Helm charts.
If you have any questions or comments about this advisory:
This vulnerability was found & reported by GE Vernova – Amit Laish.
The Argo team would like to thank these contributors for their responsible disclosure and constructive communications during the resolve of this issue
github.com/argoproj/argo-cd
github.com/argoproj/argo-cd/commit/1391ba72149655e4884d357586d3201f15bc92dc
github.com/argoproj/argo-cd/commit/b8f92c4ff226346624f43de3f25d81dac6386674
github.com/argoproj/argo-cd/releases/tag/v2.6.15
github.com/argoproj/argo-cd/releases/tag/v2.7.14
github.com/argoproj/argo-cd/releases/tag/v2.8.3
github.com/argoproj/argo-cd/security/advisories/GHSA-g687-f2gx-6wm8
nvd.nist.gov/vuln/detail/CVE-2023-40584
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
26.7%