|
1 | 1 | {
|
2 | 2 | "schema_version": "1.4.0",
|
3 | 3 | "id": "GHSA-274v-mgcv-cm8j",
|
4 |
| - "modified": "2025-02-05T16:31:11Z", |
| 4 | + "modified": "2025-02-05T16:31:13Z", |
5 | 5 | "published": "2025-01-30T17:51:33Z",
|
6 | 6 | "aliases": [],
|
7 | 7 | "summary": "Argo CD GitOps Engine does not scrub secret values from patch errors",
|
8 |
| - "details": "### Impact\nA vulnerability was discovered in Argo CD that exposed secret values in error messages and the diff view when an invalid Kubernetes Secret resource was synced from a repository. \n\nThe vulnerability assumes the user has write access to the repository and can exploit it, either intentionally or unintentionally, by committing an invalid Secret to repository and triggering a Sync. Once exploited, any user with read access to Argo CD can view the exposed secret data.\n\n### Patches\nA patch for this vulnerability is available in the following Argo CD versions:\n- v2.13.4\n- v2.12.10\n- v2.11.13\n\n### Workarounds\nThere is no workaround other than upgrading.\n\n### References\nFixed with commit https://github.com/argoproj/argo-cd/commit/6f5537bdf15ddbaa0f27a1a678632ff0743e4107 & https://github.com/argoproj/gitops-engine/commit/7e21b91e9d0f64104c8a661f3f390c5e6d73ddca", |
| 8 | + "details": "### Impact\nA vulnerability was discovered in Argo CD that exposed secret values in error messages and the diff view when an invalid Kubernetes Secret resource was synced from a repository. \n\nThe vulnerability assumes the user has write access to the repository and can exploit it, either intentionally or unintentionally, by committing an invalid Secret to repository and triggering a Sync. Once exploited, any user with read access to Argo CD can view the exposed secret data. \n\nThe vulnerability was specific to the Argo CD GitOps Engine which is a required dependency of Argo CD. At some point the versions of the two repositories were synced. The go package in Argo CD was not updated to the new versioning; instead this patch was pulled in via specific commit which keeps the version at 0.7.1 but with date and commit hash. \n\n### Patches\nArgo CD GitOps Engine patch [release-2.12](https://github.com/argoproj/gitops-engine/commit/faf5a4e5c37d22fedaa2726b430af5b5ae9e567a) which is the same commit as 0.7.1-0.20250129155113-faf5a4e5c37d\n\nA patch for this vulnerability is available in the following Argo CD versions:\n- v2.13.4: https://github.com/argoproj/argo-cd/commit/10b9589f1cefda9b3559708abef3b3c316e99971\n- v2.12.10: https://github.com/argoproj/argo-cd/commit/a9d8027d4a8bf3230e16063d4a24fbcaa3a8b457\n- v2.11.13: https://github.com/argoproj/argo-cd/commit/fa988be375842e78d241a04c27c98ae1e14d69e6\n\n### Workarounds\nThere is no workaround other than upgrading.\n\n### References\nFixed with commit https://github.com/argoproj/argo-cd/commit/6f5537bdf15ddbaa0f27a1a678632ff0743e4107 & https://github.com/argoproj/gitops-engine/commit/7e21b91e9d0f64104c8a661f3f390c5e6d73ddca", |
9 | 9 | "severity": [
|
10 | 10 | {
|
11 | 11 | "type": "CVSS_V3",
|
|
26 | 26 | "introduced": "0"
|
27 | 27 | },
|
28 | 28 | {
|
29 |
| - "last_affected": "0.7.3" |
| 29 | + "fixed": "v0.7.1-0.20250129155113-faf5a4e5c37d" |
30 | 30 | }
|
31 | 31 | ]
|
32 | 32 | }
|
33 |
| - ] |
| 33 | + ], |
| 34 | + "database_specific": { |
| 35 | + "last_known_affected_version_range": "<= 0.7.3" |
| 36 | + } |
| 37 | + }, |
| 38 | + { |
| 39 | + "package": { |
| 40 | + "ecosystem": "Go", |
| 41 | + "name": "https://github.com/argoproj/argo-cd" |
| 42 | + }, |
| 43 | + "ranges": [ |
| 44 | + { |
| 45 | + "type": "ECOSYSTEM", |
| 46 | + "events": [ |
| 47 | + { |
| 48 | + "introduced": "0" |
| 49 | + }, |
| 50 | + { |
| 51 | + "fixed": "2.11.13,2.12.10,2.13.4" |
| 52 | + } |
| 53 | + ] |
| 54 | + } |
| 55 | + ], |
| 56 | + "database_specific": { |
| 57 | + "last_known_affected_version_range": "< 2.13.4" |
| 58 | + } |
34 | 59 | }
|
35 | 60 | ],
|
36 | 61 | "references": [
|
|
42 | 67 | "type": "WEB",
|
43 | 68 | "url": "https://github.com/argoproj/gitops-engine/security/advisories/GHSA-274v-mgcv-cm8j"
|
44 | 69 | },
|
| 70 | + { |
| 71 | + "type": "WEB", |
| 72 | + "url": "https://github.com/argoproj/argo-cd/commit/10b9589f1cefda9b3559708abef3b3c316e99971" |
| 73 | + }, |
45 | 74 | {
|
46 | 75 | "type": "WEB",
|
47 | 76 | "url": "https://github.com/argoproj/argo-cd/commit/6f5537bdf15ddbaa0f27a1a678632ff0743e4107"
|
48 | 77 | },
|
| 78 | + { |
| 79 | + "type": "WEB", |
| 80 | + "url": "https://github.com/argoproj/argo-cd/commit/a9d8027d4a8bf3230e16063d4a24fbcaa3a8b457" |
| 81 | + }, |
| 82 | + { |
| 83 | + "type": "WEB", |
| 84 | + "url": "https://github.com/argoproj/argo-cd/commit/fa988be375842e78d241a04c27c98ae1e14d69e6" |
| 85 | + }, |
49 | 86 | {
|
50 | 87 | "type": "WEB",
|
51 | 88 | "url": "https://github.com/argoproj/gitops-engine/commit/7e21b91e9d0f64104c8a661f3f390c5e6d73ddca"
|
|
0 commit comments