Lucene search

K
osvGoogleOSV:GO-2023-1548
HistoryFeb 15, 2023 - 4:43 p.m.

Repository access credential leak in github.com/argoproj/argo-cd/v2

2023-02-1516:43:39
Google
osv.dev
11
argo cd
output sanitization bug
error messages
api
rbac
repositories update

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.4%

Argo CD has an output sanitization bug which leaks repository access credentials in error messages.

These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI).

The user must have “applications, create” or “applications, update” RBAC access to reach the code which may produce the error. The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository.

If the user has “repositories, update” access, they may edit an existing repository to introduce a URL typo or otherwise force an error message.

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.4%