BIT-argo-cd-2024-41666

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/argo-cd/BIT-argo-cd-2024-41666.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-argo-cd-2024-41666
Aliases
Published
2024-07-26T07:16:03.155Z
Modified
2024-08-06T22:27:05.674833Z
Summary
[none]
Details

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD has a Web-based terminal that allows users to get a shell inside a running pod, just as they would with kubectl exec. Starting in version 2.6.0, when the administrator enables this function and grants permission to the user p, role:myrole, exec, create, */*, allow, even if the user revokes this permission, the user can still perform operations in the container, as long as the user keeps the terminal view open for a long time. Although the token expiration and revocation of the user are fixed, however, the fix does not address the situation of revocation of only user p, role:myrole, exec, create, */*, allow permissions, which may still lead to the leakage of sensitive information. A patch for this vulnerability has been released in Argo CD versions 2.11.7, 2.10.16, and 2.9.21.

References

Affected packages

Bitnami / argo-cd

Package

Name
argo-cd
Purl
pkg:bitnami/argo-cd

Severity

  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
2.6.0
Fixed
2.9.21
Introduced
2.10.0
Fixed
2.10.16
Introduced
2.11.0
Fixed
2.11.7