Vulnerability Details : CVE-2022-24904
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 0.7.0 and prior to versions 2.1.15m 2.2.9, and 2.3.4 is vulnerable to a symlink following bug allowing a malicious user with repository write access to leak sensitive files from Argo CD's repo-server. A malicious Argo CD user with write access for a repository which is (or may be) used in a directory-type Application may commit a symlink which points to an out-of-bounds file. Sensitive files which could be leaked include manifest files from other Applications' source repositories (potentially decrypted files, if you are using a decryption plugin) or any JSON-formatted secrets which have been mounted as files on the repo-server. A patch for this vulnerability has been released in Argo CD versions 2.3.4, 2.2.9, and 2.1.15. Users of versions 2.3.0 or above who do not have any Jsonnet/directory-type Applications may disable the Jsonnet/directory config management tool as a workaround.
Products affected by CVE-2022-24904
- cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*
- cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*
- cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-24904
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 39 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-24904
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
2.8
|
1.4
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
2.8
|
1.4
|
GitHub, Inc. |
CWE ids for CVE-2022-24904
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
-
The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2022-24904
-
https://github.com/argoproj/argo-cd/releases/tag/v2.3.4
Release v2.3.4 · argoproj/argo-cd · GitHubRelease Notes;Third Party Advisory
-
https://github.com/argoproj/argo-cd/security/advisories/GHSA-6gcg-hp2x-q54h
Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server · Advisory · argoproj/argo-cd · GitHubMitigation;Third Party Advisory
-
https://github.com/argoproj/argo-cd/releases/tag/v2.1.15
Release v2.1.15 · argoproj/argo-cd · GitHubRelease Notes;Third Party Advisory
-
https://github.com/argoproj/argo-cd/releases/tag/v2.2.9
Release v2.2.9 · argoproj/argo-cd · GitHubRelease Notes;Third Party Advisory
Jump to