Skip to content

[GHSA-274v-mgcv-cm8j] Argo CD GitOps Engine does not scrub secret values from patch errors #5721

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed

Conversation

xnox
Copy link

@xnox xnox commented Jun 13, 2025

Updates

  • Affected products

Comments
The module versions for last broken & first fixed do not match the commit that has fixed this vulnerability.
I did go get of both commit that fixed this vulnerability, and the one just before.
Currently due to this incorrect version data Snyk and Twistlock scanners detect all builds of the project as vulnerable, when it was fixed.

Also see:

@github
Copy link
Collaborator

github commented Jun 13, 2025

Hi there @jannfis! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository.

This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory

@JonathanLEvans
Copy link

This is the same issue as #5689. Please see my response there.

@xnox
Copy link
Author

xnox commented Jun 13, 2025

Let me propose an alternative.

@xnox xnox closed this Jun 13, 2025
@github-actions github-actions bot deleted the xnox-GHSA-274v-mgcv-cm8j branch June 13, 2025 18:49
xnox added a commit to xnox/advisory-database that referenced this pull request Jun 13, 2025
The https://github.com/argoproj/gitops-engine/branches/all is in a
tricky situration w.r.t. version ranges for this vulnerability.

release-0.7 branch is obsolete and has the last tagged releases of
0.7.1, 0.7.2, 0.7.3.

Active development branches started off 0.7.0 and branch to master ans
argo-cd specific version stream. All of them use 0.7.1-DATE-COMMIT
pseudoversions.

Document that v0.7.1, v0.7.2, v0.7.3 tags are vulnerable.

Document that v0.7.1-DATE-COMMIT pseudoversions are vulnerable up to
the 2025-01-29 pseudoversion, as that is higher than all obsolete
(unmaintained & vulnerable) and matches the just before commit that
resolves this CVE in all the remediated branches and all future
branches off master.

The webform didn't let me construct such version constraints, thus
please ensure this is manually verified to be a valid syntax to
capture that v0.7.1, v0.7.2, v0.7.3 tags are vulnerable, and that
within pseudoversions between v0.7.1 and v0.7.2 there is an affected
range of when CVE got remediated across all branches.

The approach here tries to use the pseudoversions, and the fact that
unremediated branches are stale way prior to 2025-01-29, and that
remediation was cherrypicked on the same date with the same commit
date, but different git hashes. Thus using pseudoversions to declare a
very tight pseudoversion range without any commit from any branch
being missdetected as either false positive or false negative.

Also see:
- github#5689
- github#5721
- argoproj/gitops-engine#736
- golang/vulndb#3760
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants