CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
AI Score
Confidence
High
EPSS
Percentile
16.1%
SSVC
Exploitation
poc
Automatable
no
Technical Impact
partial
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD has a Web-based terminal that allows users to get a shell inside a running pod, just as they would with kubectl exec. Starting in version 2.6.0, when the administrator enables this function and grants permission to the user p, role:myrole, exec, create, */*, allow
, even if the user revokes this permission, the user can still perform operations in the container, as long as the user keeps the terminal view open for a long time. Although the token expiration and revocation of the user are fixed, however, the fix does not address the situation of revocation of only user p, role:myrole, exec, create, */*, allow
permissions, which may still lead to the leakage of sensitive information. A patch for this vulnerability has been released in Argo CD versions 2.11.7, 2.10.16, and 2.9.21.
[
{
"cpes": [
"cpe:2.3:a:argoproj:argo-cd:*:*:*:*:*:*:*:*"
],
"vendor": "argoproj",
"product": "argo-cd",
"versions": [
{
"status": "affected",
"version": "2.6.0",
"lessThan": "2.9.21",
"versionType": "custom"
},
{
"status": "affected",
"version": "2.10.0",
"lessThan": "2.10.16",
"versionType": "custom"
},
{
"status": "affected",
"version": "2.11.0",
"lessThan": "2.11.7",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
drive.google.com/file/d/1Fynj5Sho8Lf8CETqsNXZyPKlTDdmgJuN/view?usp=sharing
github.com/argoproj/argo-cd/commit/05edb2a9ca48f0f10608c1b49fbb0cf7164f6476
github.com/argoproj/argo-cd/commit/e96f32d233504101ddac028a5bf8117433d333d6
github.com/argoproj/argo-cd/commit/ef535230d8bd8ad7b18aab1ea1063e9751d348c4
github.com/argoproj/argo-cd/security/advisories/GHSA-v8wx-v5jq-qhhw
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
AI Score
Confidence
High
EPSS
Percentile
16.1%
SSVC
Exploitation
poc
Automatable
no
Technical Impact
partial