Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-40634
HistoryJul 22, 2024 - 5:22 p.m.

CVE-2024-40634 Argo CD Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint

2024-07-2217:22:55
CWE-400
GitHub_M
github.com
10
argo cd
unauthenticated
dos
vulnerability
cve-2024-40634
/api/webhook
memory allocation
oom
kill
security
fixed
2.11.6
2.10.15
2.9.20
kubernetes
gitops

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.9

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. This report details a security vulnerability in Argo CD, where an unauthenticated attacker can send a specially crafted large JSON payload to the /api/webhook endpoint, causing excessive memory allocation that leads to service disruption by triggering an Out Of Memory (OOM) kill. The issue poses a high risk to the availability of Argo CD deployments. This vulnerability is fixed in 2.11.6, 2.10.15, and 2.9.20.

CNA Affected

[
  {
    "vendor": "argoproj",
    "product": "argo-cd",
    "versions": [
      {
        "status": "affected",
        "version": ">= 1.0.0, < 2.9.20"
      },
      {
        "status": "affected",
        "version": ">= 2.10.0, < 2.10.15"
      },
      {
        "status": "affected",
        "version": ">= 2.11.0, < 2.11.6"
      }
    ]
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:argoproj:argo-cd:*:*:*:*:*:*:*:*"
    ],
    "vendor": "argoproj",
    "product": "argo-cd",
    "versions": [
      {
        "status": "affected",
        "version": "1.0.0",
        "lessThan": "2.9.20",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.10.0",
        "lessThan": "2.10.15",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.11.0",
        "lessThan": "2.11.6",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.9

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial