Lucene search

K
cve[email protected]CVE-2023-23947
HistoryFeb 16, 2023 - 6:15 p.m.

CVE-2023-23947

2023-02-1618:15:11
CWE-863
web.nvd.nist.gov
48
cve
2023
23947
argo cd
vulnerability
improper authorization
kubernetes
gitops
continuous delivery
patch

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.1%

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All Argo CD versions starting with 2.3.0-rc1 and prior to 2.3.17, 2.4.23 2.5.11, and 2.6.2 are vulnerable to an improper authorization bug which allows users who have the ability to update at least one cluster secret to update any cluster secret. The attacker could use this access to escalate privileges (potentially controlling Kubernetes resources) or to break Argo CD functionality (by preventing connections to external clusters). A patch for this vulnerability has been released in Argo CD versions 2.6.2, 2.5.11, 2.4.23, and 2.3.17. Two workarounds are available. Either modify the RBAC configuration to completely revoke all clusters, update access, or use the destinations and clusterResourceWhitelist fields to apply similar restrictions as the namespaces and clusterResources fields.

Affected configurations

Vulners
NVD
Node
argoprojargo_cdRange2.3.0-rc12.3.17
OR
argoprojargo_cdRange2.4.02.4.23
OR
argoprojargo_cdRange2.5.02.5.11
OR
argoprojargo_cdRange2.6.02.6.2

CNA Affected

[
  {
    "vendor": "argoproj",
    "product": "argo-cd",
    "versions": [
      {
        "version": ">= 2.3.0-rc1, < 2.3.17",
        "status": "affected"
      },
      {
        "version": ">= 2.4.0, < 2.4.23",
        "status": "affected"
      },
      {
        "version": ">= 2.5.0, < 2.5.11",
        "status": "affected"
      },
      {
        "version": ">= 2.6.0, < 2.6.2",
        "status": "affected"
      }
    ]
  }
]

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.1%