Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-3557 (GCVE-0-2021-3557)
Vulnerability from cvelistv5
Published
2022-02-16 16:37
Modified
2024-08-03 17:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1961929 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1961929 | Issue Tracking, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:01:07.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "argocd", "vendor": "n/a", "versions": [ { "status": "affected", "version": "argocd 1.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-16T16:37:57", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-3557", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "argocd", "version": { "version_data": [ { "version_value": "argocd 1.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-732" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-3557", "datePublished": "2022-02-16T16:37:57", "dateReserved": "2021-05-19T00:00:00", "dateUpdated": "2024-08-03T17:01:07.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-3557\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-02-16T17:15:11.177\",\"lastModified\":\"2024-11-21T06:21:50.717\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un fallo en argocd. Cualquier usuario no privilegiado es capaz de desplegar argocd en su espacio de nombres y con la ServiceAccount argocd-argocd-server creada, el usuario no privilegiado es capaz de leer todos los recursos del cl\u00faster, incluyendo todos los secretos, lo que podr\u00eda permitir escaladas de privilegios. La mayor amenaza de esta vulnerabilidad es la confidencialidad de los datos\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-732\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-732\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.1\",\"matchCriteriaId\":\"8AF7C45E-A550-4FF3-9BFE-9571A392B44B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_gitops:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32AECB90-D1B4-4398-8DDA-F685A18E2479\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1961929\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1961929\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}" } }
ghsa-8fgv-frq2-3468
Vulnerability from github
Published
2022-02-17 00:00
Modified
2024-08-07 18:30
Severity ?
VLAI Severity ?
Details
A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.
{ "affected": [], "aliases": [ "CVE-2021-3557" ], "database_specific": { "cwe_ids": [ "CWE-732" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-02-16T17:15:00Z", "severity": "MODERATE" }, "details": "A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.", "id": "GHSA-8fgv-frq2-3468", "modified": "2024-08-07T18:30:37Z", "published": "2022-02-17T00:00:31Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3557" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
rhsa-2021_2053
Vulnerability from csaf_redhat
Published
2021-05-19 17:04
Modified
2024-11-22 16:58
Summary
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
Notes
Topic
An update is now available for Red Hat OpenShift GitOps 1.1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.
Security Fix(es):
* argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster (CVE-2021-3557)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift GitOps 1.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.\n\nSecurity Fix(es):\n\n* argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster (CVE-2021-3557)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2053", "url": "https://access.redhat.com/errata/RHSA-2021:2053" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1961929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" }, { "category": "external", "summary": "GITOPS-951", "url": "https://issues.redhat.com/browse/GITOPS-951" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2053.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift GitOps security update", "tracking": { "current_release_date": "2024-11-22T16:58:13+00:00", "generator": { "date": "2024-11-22T16:58:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:2053", "initial_release_date": "2021-05-19T17:04:44+00:00", "revision_history": [ { "date": "2021-05-19T17:04:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-19T17:04:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T16:58:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift GitOps 1.1", "product": { "name": "Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_gitops:1.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift GitOps" }, { "branches": [ { "category": "product_version", "name": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "product": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "product_id": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "product_identification_helper": { "purl": "pkg:oci/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/applicationset-rhel8\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "product": { "name": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "product_id": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "product_identification_helper": { "purl": "pkg:oci/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "product_id": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64", "product": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64", "product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64", "product_identification_helper": { "purl": "pkg:oci/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "product": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "product_id": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-operator-bundle\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.1.1-1" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64" }, "product_reference": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64" }, "product_reference": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64" }, "product_reference": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64" }, "product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3557", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1961929" } ], "notes": [ { "category": "description", "text": "A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.1:openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "8Base-GitOps-1.1:openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "8Base-GitOps-1.1:openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3557" }, { "category": "external", "summary": "RHBZ#1961929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3557" } ], "release_date": "2021-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-19T17:04:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.1:openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "8Base-GitOps-1.1:openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "8Base-GitOps-1.1:openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2053" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.1:openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "8Base-GitOps-1.1:openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "8Base-GitOps-1.1:openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster" } ] }
RHSA-2021:2053
Vulnerability from csaf_redhat
Published
2021-05-19 17:04
Modified
2025-09-10 14:43
Summary
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
Notes
Topic
An update is now available for Red Hat OpenShift GitOps 1.1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.
Security Fix(es):
* argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster (CVE-2021-3557)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift GitOps 1.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.\n\nSecurity Fix(es):\n\n* argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster (CVE-2021-3557)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2053", "url": "https://access.redhat.com/errata/RHSA-2021:2053" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1961929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" }, { "category": "external", "summary": "GITOPS-951", "url": "https://issues.redhat.com/browse/GITOPS-951" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2053.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift GitOps security update", "tracking": { "current_release_date": "2025-09-10T14:43:14+00:00", "generator": { "date": "2025-09-10T14:43:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2021:2053", "initial_release_date": "2021-05-19T17:04:44+00:00", "revision_history": [ { "date": "2021-05-19T17:04:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-19T17:04:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:43:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift GitOps 1.1", "product": { "name": "Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_gitops:1.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift GitOps" }, { "branches": [ { "category": "product_version", "name": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "product": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "product_id": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "product_identification_helper": { "purl": "pkg:oci/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/applicationset-rhel8\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "product": { "name": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "product_id": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "product_identification_helper": { "purl": "pkg:oci/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "product_id": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64", "product": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64", "product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64", "product_identification_helper": { "purl": "pkg:oci/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "product": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "product_id": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-operator-bundle\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.1.1-1" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64" }, "product_reference": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64" }, "product_reference": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64" }, "product_reference": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64" }, "product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3557", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1961929" } ], "notes": [ { "category": "description", "text": "A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.1:openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "8Base-GitOps-1.1:openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "8Base-GitOps-1.1:openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3557" }, { "category": "external", "summary": "RHBZ#1961929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3557" } ], "release_date": "2021-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-19T17:04:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.1:openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "8Base-GitOps-1.1:openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "8Base-GitOps-1.1:openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2053" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.1:openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "8Base-GitOps-1.1:openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "8Base-GitOps-1.1:openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster" } ] }
rhsa-2021:2053
Vulnerability from csaf_redhat
Published
2021-05-19 17:04
Modified
2025-09-10 14:43
Summary
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
Notes
Topic
An update is now available for Red Hat OpenShift GitOps 1.1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.
Security Fix(es):
* argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster (CVE-2021-3557)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift GitOps 1.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.\n\nSecurity Fix(es):\n\n* argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster (CVE-2021-3557)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2053", "url": "https://access.redhat.com/errata/RHSA-2021:2053" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1961929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" }, { "category": "external", "summary": "GITOPS-951", "url": "https://issues.redhat.com/browse/GITOPS-951" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2053.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift GitOps security update", "tracking": { "current_release_date": "2025-09-10T14:43:14+00:00", "generator": { "date": "2025-09-10T14:43:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2021:2053", "initial_release_date": "2021-05-19T17:04:44+00:00", "revision_history": [ { "date": "2021-05-19T17:04:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-19T17:04:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:43:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift GitOps 1.1", "product": { "name": "Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_gitops:1.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift GitOps" }, { "branches": [ { "category": "product_version", "name": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "product": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "product_id": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "product_identification_helper": { "purl": "pkg:oci/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/applicationset-rhel8\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "product": { "name": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "product_id": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "product_identification_helper": { "purl": "pkg:oci/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "product_id": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64", "product": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64", "product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64", "product_identification_helper": { "purl": "pkg:oci/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "product": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "product_id": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-operator-bundle\u0026tag=v1.1.1-1" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.1.1-1" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64" }, "product_reference": "openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64" }, "product_reference": "openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64" }, "product_reference": "openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64 as a component of Red Hat OpenShift GitOps 1.1", "product_id": "8Base-GitOps-1.1:openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64" }, "product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64", "relates_to_product_reference": "8Base-GitOps-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3557", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1961929" } ], "notes": [ { "category": "description", "text": "A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.1:openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "8Base-GitOps-1.1:openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "8Base-GitOps-1.1:openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3557" }, { "category": "external", "summary": "RHBZ#1961929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3557" } ], "release_date": "2021-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-19T17:04:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.1:openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "8Base-GitOps-1.1:openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "8Base-GitOps-1.1:openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2053" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.1:openshift-gitops-1/applicationset-rhel8@sha256:5a65f7aae51eb0d14a5d650f889ee6eef6f5b204224c88d8679392b8d475a742_amd64", "8Base-GitOps-1.1:openshift-gitops-1/argocd-rhel8@sha256:aed92fa8409874ab61c6c4ac1ace9cced6eb58137d8ed5a4719abdf9de85ef5a_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-operator-bundle@sha256:1170e203046b1a08f851038c02e1175f93abe9ff57a1e5669b35ccfb87dc8644_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8-operator@sha256:bcb3dfc723916f526e86dbf722e4f10af4bea5d72670e59062aa99a0585450dd_amd64", "8Base-GitOps-1.1:openshift-gitops-1/gitops-rhel8@sha256:f9e96aea3643b7e6d91908f918a212b85c7257f6705b51a0cf31bb611c2a1be7_amd64", "8Base-GitOps-1.1:openshift-gitops-1/kam-delivery-rhel8@sha256:2201877ae45f8024bc157825fb5b28afddba65bd7e8b842367e3a8fad325766a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: ServiceAccount argocd-argocd-server is able to read all resources of the whole cluster" } ] }
gsd-2021-3557
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-3557", "description": "A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.", "id": "GSD-2021-3557", "references": [ "https://access.redhat.com/errata/RHSA-2021:2053", "https://security.archlinux.org/CVE-2021-3557" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-3557" ], "details": "A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.", "id": "GSD-2021-3557", "modified": "2023-12-13T01:23:34.767759Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-3557", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "argocd", "version": { "version_data": [ { "version_value": "argocd 1.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-732" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.1.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openshift_gitops:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-3557" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-732" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929", "refsource": "MISC", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2022-03-03T14:20Z", "publishedDate": "2022-02-16T17:15Z" } } }
fkie_cve-2021-3557
Vulnerability from fkie_nvd
Published
2022-02-16 17:15
Modified
2024-11-21 06:21
Severity ?
Summary
A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1961929 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1961929 | Issue Tracking, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
argoproj | argo_cd | * | |
redhat | openshift_gitops | 1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AF7C45E-A550-4FF3-9BFE-9571A392B44B", "versionEndExcluding": "1.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openshift_gitops:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "32AECB90-D1B4-4398-8DDA-F685A18E2479", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality." }, { "lang": "es", "value": "Se ha encontrado un fallo en argocd. Cualquier usuario no privilegiado es capaz de desplegar argocd en su espacio de nombres y con la ServiceAccount argocd-argocd-server creada, el usuario no privilegiado es capaz de leer todos los recursos del cl\u00faster, incluyendo todos los secretos, lo que podr\u00eda permitir escaladas de privilegios. La mayor amenaza de esta vulnerabilidad es la confidencialidad de los datos" } ], "id": "CVE-2021-3557", "lastModified": "2024-11-21T06:21:50.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-16T17:15:11.177", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961929" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…