Page 7 of 34 results (0.005 seconds)

CVSS: 7.7EPSS: 0%CPEs: 6EXPL: 0

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.3.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD's repo-server. A malicious Argo CD user who has been granted `get` access for a repository containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. • https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v https://access.redhat.com/security/cve/CVE-2022-24730 https://bugzilla.redhat.com/show_bug.cgi?id=2062751 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control CWE-863: Incorrect Authorization •

CVSS: 7.7EPSS: 0%CPEs: 2EXPL: 3

Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related to Helm charts because of an error in helmTemplate in repository.go. For example, an attacker may be able to discover credentials stored in a YAML file. Argo CD versiones anteriores a 2.1.9 y versiones 2.2.x anteriores a 2.2.4, permite un salto de directorios relacionado con los gráficos de Helm debido a un error en helmTemplate en el archivo repository.go. Por ejemplo, un atacante puede ser capaz de detectar las credenciales almacenadas en un archivo YAML A flaw was found in GitOps. This flaw allows an attacker with permissions to create or update applications in ArgoCD to craft a malicious helm chart that contains symbolic links pointing to arbitrary paths outside the repository root folder, leading to a path traversal issue. • https://github.com/jkroepke/CVE-2022-24348-2 https://apiiro.com/blog/malicious-kubernetes-helm-charts-can-be-used-to-steal-sensitive-information-from-argo-cd-deployments https://github.com/argoproj/argo-cd/security/advisories/GHSA-63qx-x74g-jcr7 https://access.redhat.com/security/cve/CVE-2022-24348 https://bugzilla.redhat.com/show_bug.cgi?id=2050826 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Argo CD before 1.8.4. Browser XSS protection is not activated due to the missing XSS protection header. Se detectó un problema en Argo CD versiones anteriores a 1.8.4. Una protección de XSS del navegador no está activada debido a una falta del encabezado de protección de XSS • https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4 https://github.com/argoproj/argo-cd/security/advisories/GHSA-pg99-h5gc-446r • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Argo CD before 1.8.4. Accessing the endpoint /api/version leaks internal information for the system, and this endpoint is not protected with authentication. Se detectó un problema en Argo CD versiones anteriores a 1.8.4. Accediendo al endpoint /api/versión se filtra información interna del sistema, y ??este endpoint no está protegido con autenticación • https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4 https://github.com/argoproj/argo-cd/security/advisories/GHSA-pfgj-mh5m-2p48 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •