Vulnerability identifier: #VU72074
Vulnerability risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Argo CD
Web applications /
Modules and components for CMS
Vendor: Argo
Description
The vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The
error message is visible when a user attempts to create or update an
Application via the Argo CD API (and therefor the UI or CLI). The user
must have applications, create
or applications, update
RBAC access to reach the code which may produce the error. A remote user can gain unauthorized access to sensitive information.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Argo CD: 2.6.0
External links
http://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.