#VU72074 Information disclosure in Argo CD


Published: 2023-02-08

Vulnerability identifier: #VU72074

Vulnerability risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-25163

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Argo CD
Web applications / Modules and components for CMS

Vendor: Argo

Description

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have applications, create or applications, update RBAC access to reach the code which may produce the error. A remote user can gain unauthorized access to sensitive information.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Argo CD: 2.6.0


External links
http://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability