Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2023-50726
HistoryMar 13, 2024 - 8:50 p.m.

CVE-2023-50726 Users with `create` but not `override` privileges can perform local sync in argo-cd

2024-03-1320:50:52
CWE-269
GitHub_M
github.com
3
cve-2023-50726
argo cd
local sync
improper validation
bug
create privileges
override privileges
kubernetes
gitops
continuous delivery
patch
upgrade
rbac access
mitigation

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L

AI Score

6.4

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. “Local sync” is an Argo CD feature that allows developers to temporarily override an Application’s manifests with locally-defined manifests. Use of the feature should generally be limited to highly-trusted users, since it allows the user to bypass any merge protections in git. An improper validation bug allows users who have create privileges but not override privileges to sync local manifests on app creation. All other restrictions, including AppProject restrictions are still enforced. The only restriction which is not enforced is that the manifests come from some approved git/Helm/OCI source. The bug was introduced in 1.2.0-rc1 when the local manifest sync feature was added. The bug has been patched in Argo CD versions 2.10.3, 2.9.8, and 2.8.12. Users are advised to upgrade. Users unable to upgrade may mitigate the risk of branch protection bypass by removing applications, create RBAC access. The only way to eliminate the issue without removing RBAC access is to upgrade to a patched version.

CNA Affected

[
  {
    "vendor": "argoproj",
    "product": "argo-cd",
    "versions": [
      {
        "status": "affected",
        "version": ">= 1.2.0-rc1, < 2.8.12"
      },
      {
        "status": "affected",
        "version": ">= 2.9.0, < 2.9.8"
      },
      {
        "status": "affected",
        "version": ">= 2.10.0, < 2.10.3"
      }
    ]
  }
]

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L

AI Score

6.4

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial