A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1961929 | Issue Tracking Third Party Advisory |
Configurations
History
07 Aug 2024, 15:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:* | |
First Time |
Argoproj
Argoproj argo Cd |
Information
Published : 2022-02-16 17:15
Updated : 2024-08-07 15:43
NVD link : CVE-2021-3557
Mitre link : CVE-2021-3557
CVE.ORG link : CVE-2021-3557
JSON object : View
Products Affected
redhat
- openshift_gitops
argoproj
- argo_cd
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource