Lucene search

K
cve[email protected]CVE-2022-31105
HistoryJul 12, 2022 - 10:15 p.m.

CVE-2022-31105

2022-07-1222:15:08
CWE-599
CWE-295
web.nvd.nist.gov
664
3
argo cd
vulnerability
certificate validation
cve-2022-31105
kubernetes
gitops
continuous delivery
security
patch
oidc
openid connect

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.7%

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 0.4.0 and prior to 2.2.11, 2.3.6, and 2.4.5 is vulnerable to an improper certificate validation bug which could cause Argo CD to trust a malicious (or otherwise untrustworthy) OpenID Connect (OIDC) provider. A patch for this vulnerability has been released in Argo CD versions 2.4.5, 2.3.6, and 2.2.11. There are no complete workarounds, but a partial workaround is available. Those who use an external OIDC provider (not the bundled Dex instance), can mitigate the issue by setting the oidc.config.rootCA field in the argocd-cm ConfigMap. This mitigation only forces certificate validation when the API server handles login flows. It does not force certificate verification when verifying tokens on API calls.

Affected configurations

Vulners
NVD
Node
argoprojargo_cdRange0.4.02.2.11
OR
argoprojargo_cdRange2.3.02.3.6
OR
argoprojargo_cdRange2.4.02.4.5

CNA Affected

[
  {
    "product": "argo-cd",
    "vendor": "argoproj",
    "versions": [
      {
        "status": "affected",
        "version": ">= 0.4.0, < 2.2.11"
      },
      {
        "status": "affected",
        "version": ">= 2.3.0, < 2.3.6"
      },
      {
        "status": "affected",
        "version": ">= 2.4.0, < 2.4.5"
      }
    ]
  }
]

Social References

More

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.7%