Argo CD is a declarative continuous deployment for Kubernetes. Argo CD Cluster secrets might be managed declaratively using Argo CD / kubectl apply. As a result, the full secret body is stored in`kubectl.kubernetes.io/last-applied-configuration` annotation. pull request #7139 introduced the ability to manage cluster labels and annotations. Since clusters are stored as secrets it also exposes the `kubectl.kubernetes.io/last-applied-configuration` annotation which includes full secret body. In order to view the cluster annotations via the Argo CD API, the user must have `clusters, get` RBAC access. **Note:** In many cases, cluster secrets do not contain any actually-secret information. But sometimes, as in bearer-token auth, the contents might be very sensitive. The bug has been patched in versions 2.8.3, 2.7.14, and 2.6.15. Users are advised to upgrade. Users unable to upgrade should update/deploy cluster secret with `server-side-apply` flag which does not use or rely on `kubectl.kubernetes.io/last-applied-configuration` annotation. Note: annotation for existing secrets will require manual removal.
References
Link | Resource |
---|---|
https://github.com/argoproj/argo-cd/commit/4b2e5b06bff2ffd8ed1970654ddd8e55fc4a41c4 | Patch |
https://github.com/argoproj/argo-cd/pull/7139 | Patch Vendor Advisory |
https://github.com/argoproj/argo-cd/security/advisories/GHSA-fwr2-64vr-xv9m | Exploit Vendor Advisory |
https://github.com/argoproj/argo-cd/commit/4b2e5b06bff2ffd8ed1970654ddd8e55fc4a41c4 | Patch |
https://github.com/argoproj/argo-cd/pull/7139 | Patch Vendor Advisory |
https://github.com/argoproj/argo-cd/security/advisories/GHSA-fwr2-64vr-xv9m | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.9 |
References | () https://github.com/argoproj/argo-cd/commit/4b2e5b06bff2ffd8ed1970654ddd8e55fc4a41c4 - Patch | |
References | () https://github.com/argoproj/argo-cd/pull/7139 - Patch, Vendor Advisory | |
References | () https://github.com/argoproj/argo-cd/security/advisories/GHSA-fwr2-64vr-xv9m - Exploit, Vendor Advisory |
07 Aug 2024, 15:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:* | |
First Time |
Argoproj
Argoproj argo Cd |
27 Oct 2023, 14:31
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.6 |
13 Sep 2023, 14:49
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linuxfoundation argo Continuous Delivery
Linuxfoundation |
|
References | (MISC) https://github.com/argoproj/argo-cd/security/advisories/GHSA-fwr2-64vr-xv9m - Exploit, Vendor Advisory | |
References | (MISC) https://github.com/argoproj/argo-cd/pull/7139 - Patch, Vendor Advisory | |
References | (MISC) https://github.com/argoproj/argo-cd/commit/4b2e5b06bff2ffd8ed1970654ddd8e55fc4a41c4 - Patch | |
CWE | CWE-532 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CPE | cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:* |
07 Sep 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-07 23:15
Updated : 2024-11-21 08:18
NVD link : CVE-2023-40029
Mitre link : CVE-2023-40029
CVE.ORG link : CVE-2023-40029
JSON object : View
Products Affected
argoproj
- argo_cd