CVE-2024-31989

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It has been discovered that an unprivileged pod in a different namespace on the same cluster could connect to the Redis server on port 6379. Despite having installed the latest version of the VPC CNI plugin on the EKS cluster, it requires manual enablement through configuration to enforce network policies. This raises concerns that many clients might unknowingly have open access to their Redis servers. This vulnerability could lead to Privilege Escalation to the level of cluster controller, or to information leakage, affecting anyone who does not have strict access controls on their Redis instance. This issue has been patched in version(s) 2.8.19, 2.9.15 and 2.10.10.
References
Link Resource
https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d
https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678
https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c
https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff
https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12
https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07
https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994
https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0
https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr
https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d
https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678
https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c
https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff
https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12
https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07
https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994
https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0
https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr
Configurations

No configuration.

History

21 Nov 2024, 09:14

Type Values Removed Values Added
Summary
  • (es) Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Se ha descubierto que un pod sin privilegios en un espacio de nombres diferente en el mismo clúster podría conectarse al servidor Redis en el puerto 6379. A pesar de haber instalado la última versión del complemento VPC CNI en el clúster EKS, requiere habilitación manual a través de la configuración para aplicar políticas de red. Esto genera preocupación de que muchos clientes, sin saberlo, puedan tener acceso abierto a sus servidores Redis. Esta vulnerabilidad podría provocar una escalada de privilegios al nivel del controlador del clúster o una fuga de información, afectando a cualquiera que no tenga controles de acceso estrictos en su instancia de Redis. Este problema se solucionó en las versiones 2.8.19, 2.9.15 y 2.10.10.
References () https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d - () https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d -
References () https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678 - () https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678 -
References () https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c - () https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c -
References () https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff - () https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff -
References () https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12 - () https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12 -
References () https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07 - () https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07 -
References () https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994 - () https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994 -
References () https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0 - () https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0 -
References () https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr - () https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr -

21 May 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 19:15

Updated : 2024-11-21 09:14


NVD link : CVE-2024-31989

Mitre link : CVE-2024-31989

CVE.ORG link : CVE-2024-31989


JSON object : View

Products Affected

No product.

CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm