In Argo versions prior to v1.5.0-rc1, it was possible for authenticated Argo users to submit API calls to retrieve secrets and other manifests which were stored within git.
References
Link | Resource |
---|---|
https://www.soluble.ai/blog/argo-cves-2020 | Exploit Third Party Advisory |
https://github.com/argoproj/argo-cd/issues/470 | Third Party Advisory |
https://github.com/argoproj/argo-cd/pull/3088 | Patch Third Party Advisory |
https://github.com/argoproj/argo-cd/blob/a1afe44066fcd0a0ab90a02a23177164bbad42cf/util/diff/diff.go#L399 | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-04-09 10:15
Updated : 2020-04-14 11:22
NVD link : CVE-2018-21034
Mitre link : CVE-2018-21034
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
linuxfoundation
- argo_continuous_delivery