Action not permitted
Modal body text goes here.
cve-2022-1025
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww | Exploit, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:47:43.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ArgoCD", "vendor": "n/a", "versions": [ { "status": "affected", "version": "0.5.0 through 2.1.12, 2.2.7, 2.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284-\u003eCWE-1220", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-12T20:39:54", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-1025", "datePublished": "2022-07-12T20:39:54", "dateReserved": "2022-03-18T00:00:00", "dateUpdated": "2024-08-02T23:47:43.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-1025\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-07-12T21:15:09.277\",\"lastModified\":\"2024-11-21T06:39:52.887\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.\"},{\"lang\":\"es\",\"value\":\"Todas las versiones sin parchear de Argo CD a partir de la v1.0.0 son vulnerables a un error de control de acceso inapropiado, que permite a un usuario malicioso escalar potencialmente sus privilegios a nivel de administrador\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.5.0\",\"versionEndIncluding\":\"2.1.12\",\"matchCriteriaId\":\"7C40D6BC-B072-460B-979E-38DAFD647116\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.2.0\",\"versionEndIncluding\":\"2.2.7\",\"matchCriteriaId\":\"5EB85D90-1033-44EB-9072-7092928B9197\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.3.0\",\"versionEndIncluding\":\"2.3.1\",\"matchCriteriaId\":\"8AA4B893-1A42-4C8A-8A05-8C5B96277A2A\"}]}]}],\"references\":[{\"url\":\"https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}" } }
rhsa-2022_1040
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift GitOps 1.3\n\nOpenShift GitOps v1.3.5 for OCP 4.6\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.\n\nSecurity Fix(es):\n\n* Openshift-Gitops: Improper access control allows admin privilege escalation (CVE-2022-1025)\n\n* argocd: path traversal and improper access control allows leaking out-of-bound files (CVE-2022-24730)\n\n* argocd: path traversal allows leaking out-of-bound files (CVE-2022-24731)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1040", "url": "https://access.redhat.com/errata/RHSA-2022:1040" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1040.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift GitOps security update", "tracking": { "current_release_date": "2024-11-22T18:38:56+00:00", "generator": { "date": "2024-11-22T18:38:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1040", "initial_release_date": "2022-03-23T21:17:24+00:00", "revision_history": [ { "date": "2022-03-23T21:17:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-23T21:17:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T18:38:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift GitOps 1.3", "product": { "name": "Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_gitops:1.3::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift GitOps" }, { "branches": [ { "category": "product_version", "name": "openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "product": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "product_id": "openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "product_identification_helper": { "purl": "pkg:oci/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/applicationset-rhel8\u0026tag=v1.3.5-4" } } }, { "category": "product_version", "name": "openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64", "product": { "name": "openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64", "product_id": "openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64", "product_identification_helper": { "purl": "pkg:oci/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.3.5-4" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "product_id": "openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.3.5-4" } } }, { "category": "product_version", "name": "openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "product": { "name": "openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "product_id": "openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "product_identification_helper": { "purl": "pkg:oci/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/dex-rhel8\u0026tag=v1.3.5-4" } } }, { "category": "product_version", "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64", "product": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64", "product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64", "product_identification_helper": { "purl": "pkg:oci/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.3.5-4" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "product": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "product_id": "openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-operator-bundle\u0026tag=v1.3.5-4" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.3.5-4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64" }, "product_reference": "openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" }, "product_reference": "openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64" }, "product_reference": "openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64" }, "product_reference": "openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" }, "product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1025", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064682" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in ArgoCD. This flaw allows a malicious user who has push access to an application\u0027s source git or Helm repository, or sync and override access, to perform actions they are not authorized to do. \r\n\r\nFor example, if the attacker has `update` or `delete` access, they can modify or delete any resource on the destination cluster and escalate ArgoCD privileges to the admin level. If the attacker has `get` access, they can view and list actions for any resource on the destination cluster except secrets and view the logs of any pods on the destination cluster. If the attacker has action/{some action or *} access on the application, they can run an action for any resource that supports the allowed action on the application\u0027s destination cluster.", "title": "Vulnerability description" }, { "category": "summary", "text": "Openshift-Gitops: Improper access control allows admin privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ], "known_not_affected": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1025" }, { "category": "external", "summary": "RHBZ#2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1025", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:17:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Openshift-Gitops: Improper access control allows admin privilege escalation" }, { "cve": "CVE-2022-24730", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062751" } ], "notes": [ { "category": "description", "text": "A flaw was found in ArgoCD. This flaw allows an attacker with read-only repository access to leak files from the repo server that the attacker should not have access to. An attacker can send a crafted request to retrieve file contents. This issue results in the disclosure of sensitive information to an unauthorized actor and compromises data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal and improper access control allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ], "known_not_affected": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24730" }, { "category": "external", "summary": "RHBZ#2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24730", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24730" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:17:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal and improper access control allows leaking out-of-bound files" }, { "cve": "CVE-2022-24731", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062755" } ], "notes": [ { "category": "description", "text": "A path traversal flaw was found in ArgoCD. This flaw allows an attacker who has been granted create or update access to applications to leak the contents of any text file on the repo-server by crafting a malicious Helm chart. Such text files could include sensitive information that the attacker should not have access to, compromising data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ], "known_not_affected": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24731" }, { "category": "external", "summary": "RHBZ#2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:17:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal allows leaking out-of-bound files" } ] }
rhsa-2022_1042
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift GitOps 1.3\n\nOpenShift GitOps v1.3.6 for OCP 4.7+\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.\n\nSecurity Fix(es):\n\n* Openshift-Gitops: Improper access control allows admin privilege escalation\n(CVE-2022-1025)\n\n* argocd: path traversal and improper access control allows leaking out-of-bound\nfiles (CVE-2022-24730)\n\n* argocd: path traversal allows leaking out-of-bound files (CVE-2022-24731)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1042", "url": "https://access.redhat.com/errata/RHSA-2022:1042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1042.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift GitOps security update", "tracking": { "current_release_date": "2024-11-22T18:38:39+00:00", "generator": { "date": "2024-11-22T18:38:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1042", "initial_release_date": "2022-03-23T21:53:20+00:00", "revision_history": [ { "date": "2022-03-23T21:53:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-23T21:53:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T18:38:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift GitOps 1.3", "product": { "name": "Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_gitops:1.3::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift GitOps" }, { "branches": [ { "category": "product_version", "name": "openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "product": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "product_id": "openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "product_identification_helper": { "purl": "pkg:oci/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/applicationset-rhel8\u0026tag=v1.3.6-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64", "product": { "name": "openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64", "product_id": "openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64", "product_identification_helper": { "purl": "pkg:oci/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.3.6-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "product_id": "openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.3.6-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "product": { "name": "openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "product_id": "openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "product_identification_helper": { "purl": "pkg:oci/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/dex-rhel8\u0026tag=v1.3.6-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64", "product": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64", "product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64", "product_identification_helper": { "purl": "pkg:oci/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.3.6-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "product": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "product_id": "openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-operator-bundle\u0026tag=v1.3.6-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.3.6-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64" }, "product_reference": "openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" }, "product_reference": "openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64" }, "product_reference": "openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64" }, "product_reference": "openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" }, "product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1025", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064682" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in ArgoCD. This flaw allows a malicious user who has push access to an application\u0027s source git or Helm repository, or sync and override access, to perform actions they are not authorized to do. \r\n\r\nFor example, if the attacker has `update` or `delete` access, they can modify or delete any resource on the destination cluster and escalate ArgoCD privileges to the admin level. If the attacker has `get` access, they can view and list actions for any resource on the destination cluster except secrets and view the logs of any pods on the destination cluster. If the attacker has action/{some action or *} access on the application, they can run an action for any resource that supports the allowed action on the application\u0027s destination cluster.", "title": "Vulnerability description" }, { "category": "summary", "text": "Openshift-Gitops: Improper access control allows admin privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ], "known_not_affected": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1025" }, { "category": "external", "summary": "RHBZ#2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1025", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:53:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Openshift-Gitops: Improper access control allows admin privilege escalation" }, { "cve": "CVE-2022-24730", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062751" } ], "notes": [ { "category": "description", "text": "A flaw was found in ArgoCD. This flaw allows an attacker with read-only repository access to leak files from the repo server that the attacker should not have access to. An attacker can send a crafted request to retrieve file contents. This issue results in the disclosure of sensitive information to an unauthorized actor and compromises data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal and improper access control allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ], "known_not_affected": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24730" }, { "category": "external", "summary": "RHBZ#2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24730", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24730" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:53:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal and improper access control allows leaking out-of-bound files" }, { "cve": "CVE-2022-24731", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062755" } ], "notes": [ { "category": "description", "text": "A path traversal flaw was found in ArgoCD. This flaw allows an attacker who has been granted create or update access to applications to leak the contents of any text file on the repo-server by crafting a malicious Helm chart. Such text files could include sensitive information that the attacker should not have access to, compromising data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ], "known_not_affected": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24731" }, { "category": "external", "summary": "RHBZ#2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:53:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal allows leaking out-of-bound files" } ] }
rhsa-2022_1039
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openshift-gitops-applicationset-container, openshift-gitops-container, openshift-gitops-kam-delivery-container, and openshift-gitops-operator-container is now available for Red Hat OpenShift GitOps 1.2. (GitOps v1.2.3)\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.\n\nSecurity Fix(es):\n\n* Openshift-Gitops: Improper access control allows admin privilege escalation (CVE-2022-1025)\n\n* argocd: path traversal and improper access control allows leaking out-of-bound files (CVE-2022-24730)\n\n* argocd: path traversal allows leaking out-of-bound files (CVE-2022-24731)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1039", "url": "https://access.redhat.com/errata/RHSA-2022:1039" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1039.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift GitOps security update", "tracking": { "current_release_date": "2024-11-22T18:38:47+00:00", "generator": { "date": "2024-11-22T18:38:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1039", "initial_release_date": "2022-03-23T21:19:59+00:00", "revision_history": [ { "date": "2022-03-23T21:19:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-23T21:19:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T18:38:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift GitOps 1.2", "product": { "name": "Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_gitops:1.2::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift GitOps" }, { "branches": [ { "category": "product_version", "name": "openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "product": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "product_id": "openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "product_identification_helper": { "purl": "pkg:oci/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/applicationset-rhel8\u0026tag=v1.2.3-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64", "product": { "name": "openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64", "product_id": "openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64", "product_identification_helper": { "purl": "pkg:oci/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.2.3-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "product_id": "openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.2.3-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64", "product": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64", "product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64", "product_identification_helper": { "purl": "pkg:oci/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.2.3-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "product": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "product_id": "openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-operator-bundle\u0026tag=v1.2.3-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.2.3-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64 as a component of Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64" }, "product_reference": "openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "relates_to_product_reference": "8Base-GitOps-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64 as a component of Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" }, "product_reference": "openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64", "relates_to_product_reference": "8Base-GitOps-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64 as a component of Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64" }, "product_reference": "openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "relates_to_product_reference": "8Base-GitOps-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64 as a component of Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "relates_to_product_reference": "8Base-GitOps-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64 as a component of Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "relates_to_product_reference": "8Base-GitOps-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64 as a component of Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" }, "product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64", "relates_to_product_reference": "8Base-GitOps-1.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1025", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064682" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in ArgoCD. This flaw allows a malicious user who has push access to an application\u0027s source git or Helm repository, or sync and override access, to perform actions they are not authorized to do. \r\n\r\nFor example, if the attacker has `update` or `delete` access, they can modify or delete any resource on the destination cluster and escalate ArgoCD privileges to the admin level. If the attacker has `get` access, they can view and list actions for any resource on the destination cluster except secrets and view the logs of any pods on the destination cluster. If the attacker has action/{some action or *} access on the application, they can run an action for any resource that supports the allowed action on the application\u0027s destination cluster.", "title": "Vulnerability description" }, { "category": "summary", "text": "Openshift-Gitops: Improper access control allows admin privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ], "known_not_affected": [ "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1025" }, { "category": "external", "summary": "RHBZ#2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1025", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:19:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1039" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Openshift-Gitops: Improper access control allows admin privilege escalation" }, { "cve": "CVE-2022-24730", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062751" } ], "notes": [ { "category": "description", "text": "A flaw was found in ArgoCD. This flaw allows an attacker with read-only repository access to leak files from the repo server that the attacker should not have access to. An attacker can send a crafted request to retrieve file contents. This issue results in the disclosure of sensitive information to an unauthorized actor and compromises data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal and improper access control allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ], "known_not_affected": [ "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24730" }, { "category": "external", "summary": "RHBZ#2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24730", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24730" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:19:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1039" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal and improper access control allows leaking out-of-bound files" }, { "cve": "CVE-2022-24731", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062755" } ], "notes": [ { "category": "description", "text": "A path traversal flaw was found in ArgoCD. This flaw allows an attacker who has been granted create or update access to applications to leak the contents of any text file on the repo-server by crafting a malicious Helm chart. Such text files could include sensitive information that the attacker should not have access to, compromising data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ], "known_not_affected": [ "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24731" }, { "category": "external", "summary": "RHBZ#2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:19:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1039" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal allows leaking out-of-bound files" } ] }
rhsa-2022_1041
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift GitOps 1.4\n\nOpenShift GitOps v1.4.4\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.\n\nSecurity Fix(es):\n\n* Openshift-Gitops: Improper access control allows admin privilege escalation\n(CVE-2022-1025)\n\n* argocd: path traversal and improper access control allows leaking out-of-bound\nfiles (CVE-2022-24730)\n\n* argocd: path traversal allows leaking out-of-bound files (CVE-2022-24731)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1041", "url": "https://access.redhat.com/errata/RHSA-2022:1041" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1041.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift GitOps security update", "tracking": { "current_release_date": "2024-11-22T18:38:31+00:00", "generator": { "date": "2024-11-22T18:38:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1041", "initial_release_date": "2022-03-23T21:18:40+00:00", "revision_history": [ { "date": "2022-03-23T21:18:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-23T21:18:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T18:38:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift GitOps 1.4", "product": { "name": "Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_gitops:1.4::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift GitOps" }, { "branches": [ { "category": "product_version", "name": "openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "product": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "product_id": "openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "product_identification_helper": { "purl": "pkg:oci/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/applicationset-rhel8\u0026tag=v1.4.4-6" } } }, { "category": "product_version", "name": "openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64", "product": { "name": "openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64", "product_id": "openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64", "product_identification_helper": { "purl": "pkg:oci/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.4.4-6" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "product_id": "openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.4.4-6" } } }, { "category": "product_version", "name": "openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "product": { "name": "openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "product_id": "openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "product_identification_helper": { "purl": "pkg:oci/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/dex-rhel8\u0026tag=v1.4.4-6" } } }, { "category": "product_version", "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64", "product": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64", "product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64", "product_identification_helper": { "purl": "pkg:oci/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.4.4-6" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "product": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "product_id": "openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-operator-bundle\u0026tag=v1.4.4-6" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.4.4-6" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64" }, "product_reference": "openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" }, "product_reference": "openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64" }, "product_reference": "openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64" }, "product_reference": "openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" }, "product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1025", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064682" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in ArgoCD. This flaw allows a malicious user who has push access to an application\u0027s source git or Helm repository, or sync and override access, to perform actions they are not authorized to do. \r\n\r\nFor example, if the attacker has `update` or `delete` access, they can modify or delete any resource on the destination cluster and escalate ArgoCD privileges to the admin level. If the attacker has `get` access, they can view and list actions for any resource on the destination cluster except secrets and view the logs of any pods on the destination cluster. If the attacker has action/{some action or *} access on the application, they can run an action for any resource that supports the allowed action on the application\u0027s destination cluster.", "title": "Vulnerability description" }, { "category": "summary", "text": "Openshift-Gitops: Improper access control allows admin privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ], "known_not_affected": [ "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1025" }, { "category": "external", "summary": "RHBZ#2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1025", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:18:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Openshift-Gitops: Improper access control allows admin privilege escalation" }, { "cve": "CVE-2022-24730", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062751" } ], "notes": [ { "category": "description", "text": "A flaw was found in ArgoCD. This flaw allows an attacker with read-only repository access to leak files from the repo server that the attacker should not have access to. An attacker can send a crafted request to retrieve file contents. This issue results in the disclosure of sensitive information to an unauthorized actor and compromises data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal and improper access control allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ], "known_not_affected": [ "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24730" }, { "category": "external", "summary": "RHBZ#2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24730", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24730" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:18:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal and improper access control allows leaking out-of-bound files" }, { "cve": "CVE-2022-24731", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062755" } ], "notes": [ { "category": "description", "text": "A path traversal flaw was found in ArgoCD. This flaw allows an attacker who has been granted create or update access to applications to leak the contents of any text file on the repo-server by crafting a malicious Helm chart. Such text files could include sensitive information that the attacker should not have access to, compromising data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ], "known_not_affected": [ "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24731" }, { "category": "external", "summary": "RHBZ#2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:18:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal allows leaking out-of-bound files" } ] }
gsd-2022-1025
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-1025", "description": "All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.", "id": "GSD-2022-1025", "references": [ "https://access.redhat.com/errata/RHSA-2022:1039", "https://access.redhat.com/errata/RHSA-2022:1040", "https://access.redhat.com/errata/RHSA-2022:1041", "https://access.redhat.com/errata/RHSA-2022:1042" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-1025" ], "details": "All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.", "id": "GSD-2022-1025", "modified": "2023-12-13T01:19:27.993727Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2022-1025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ArgoCD", "version": { "version_data": [ { "version_affected": "=", "version_value": "0.5.0 through 2.1.12, 2.2.7, 2.3.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-284", "lang": "eng", "value": "CWE-284-\u003eCWE-1220" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww", "refsource": "MISC", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=v0.5.0 \u003cv2.1.14||\u003e=v2.2.0 \u003cv2.2.8||\u003e=v2.3.0 \u003cv2.3.2", "affected_versions": "All versions starting from 0.5.0 before 2.1.14, all versions starting from 2.2.0 before 2.2.8, all versions starting from 2.3.0 before 2.3.2", "cvss_v2": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-863", "CWE-937" ], "date": "2022-07-21", "description": "All unpatched versions of Argo CD starting with v1.0.0 is vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.", "fixed_versions": [ "v2.1.14", "v2.2.8", "v2.3.2" ], "identifier": "CVE-2022-1025", "identifiers": [ "GHSA-96jv-vj39-x4j6", "CVE-2022-1025" ], "not_impacted": "All versions starting from 2.1.14 before 2.2.0, all versions starting from 2.2.8 before 2.3.0, all versions starting from 2.3.2", "package_slug": "go/github.com/argoproj/argo-cd", "pubdate": "2022-07-13", "solution": "Upgrade to version 2.1.14, 2.2.8, 2.3.2 or above.", "title": "Incorrect Authorization", "urls": [ "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww", "https://nvd.nist.gov/vuln/detail/CVE-2022-1025", "https://github.com/argoproj/argo-cd/commit/af03b291d4b7e9d3ce9a6580ae9c8141af0e05cf", "https://github.com/advisories/GHSA-96jv-vj39-x4j6" ], "uuid": "341cda7a-f9b6-4437-a74d-822a9e9a20ac", "versions": [ { "commit": { "sha": "df0e2e4015c4cff4e16c8743df9d62f5ca1bdc24", "tags": [ "v0.5.0" ], "timestamp": "20180612175411" }, "number": "v0.5.0" }, { "commit": { "sha": "eb3d1fb84b9b77cdffd70b14c4f949f1c64a9416", "tags": [ "v1.8.7" ], "timestamp": "20210303070237" }, "number": "v1.8.7" } ] }, { "affected_range": "\u003cv2.1.14 || \u003e=v2.2.0 \u003cv2.2.8 || \u003e=v2.3.0 \u003cv2.3.2", "affected_versions": "All versions before 2.1.14, all versions starting from 2.2.0 before 2.2.8, all versions starting from 2.3.0 before 2.3.2", "cvss_v2": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-863", "CWE-937" ], "date": "2022-07-21", "description": "All unpatched versions of Argo CD starting with v1.0.0 is vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.", "fixed_versions": [ "v2.1.14", "v2.2.8", "v2.3.2" ], "identifier": "CVE-2022-1025", "identifiers": [ "GHSA-96jv-vj39-x4j6", "CVE-2022-1025" ], "not_impacted": "All versions starting from 2.1.14 before 2.2.0, all versions starting from 2.2.8 before 2.3.0, all versions starting from 2.3.2", "package_slug": "go/github.com/argoproj/argo-cd/v2", "pubdate": "2022-07-13", "solution": "Upgrade to versions 2.1.14, 2.2.8, 2.3.2 or above.", "title": "Incorrect Authorization", "urls": [ "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww", "https://nvd.nist.gov/vuln/detail/CVE-2022-1025", "https://github.com/argoproj/argo-cd/commit/af03b291d4b7e9d3ce9a6580ae9c8141af0e05cf", "https://github.com/advisories/GHSA-96jv-vj39-x4j6" ], "uuid": "f5282530-e554-4e78-88d3-4acec42e0a58", "versions": [ { "commit": { "sha": "6da92a8e8103ce4145bb0fe2b7e952be79c9ff0a", "tags": [ "v2.2.0" ], "timestamp": "20211214180104" }, "number": "v2.2.0" }, { "commit": { "sha": "fe427802293b090f43f91f5839393174df6c3b3a", "tags": [ "v2.3.0" ], "timestamp": "20220306061859" }, "number": "v2.3.0" }, { "commit": { "sha": "836cde06baef111fa2d7fe157de5c199b16bcd2b", "tags": [ "v2.1.14" ], "timestamp": "20220323000936" }, "number": "v2.1.14" }, { "commit": { "sha": "93d588c86e9740a5df3e5379a07593de28da0d1a", "tags": [ "v2.2.8" ], "timestamp": "20220323001830" }, "number": "v2.2.8" }, { "commit": { "sha": "ecc2af9dcaa12975e654cde8cbbeaffbb315f75c", "tags": [ "v2.3.2" ], "timestamp": "20220323003213" }, "number": "v2.3.2" } ] } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.1.12", "versionStartIncluding": "0.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.3.1", "versionStartIncluding": "2.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.2.7", "versionStartIncluding": "2.2.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2022-1025" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-06-27T15:54Z", "publishedDate": "2022-07-12T21:15Z" } } }
ghsa-96jv-vj39-x4j6
Vulnerability from github
Impact
Impacts for versions starting with v1.0.0
All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.
To perform the following exploits, an authorized Argo CD user must have push access to an Application's source git or Helm repository or sync
and override
access to an Application. Once a user has that access, different exploitation levels are possible depending on their other RBAC privileges:
- If that user has
update
access to the Application, they can modify any resource on the Application's destination cluster. If the destination cluster is or can be made to be the same as the cluster hosting Argo CD, the user can escalate their Argo CD permissions to admin-level. - If the user has
delete
access to the Application, they can delete any resource on the Application's destination cluster. (This exploit is possible starting with v0.8.0.) - If the user has
get
access to the Application, they can view any resource on the Application's destination cluster (except for the contents of Secrets) and list actions available for that resource. - If the user has
get
access to the Application, they can view the logs of any Pods on the Application's destination cluster. - If the user has
action/{some action or *}
access on the Application, they can run an action for any resource (which supports the allowed action(s)) on the Application's destination cluster. (Some actions are available in Argo CD by default, and others may be configured by an Argo CD admin.)
See the Argo CD RBAC documentation for an explanation of the privileges available in Argo CD.
Events exploit
A related exploit is possible for a user with get
access to an Application even if they do not have access to the Application's source git or Helm repository or sync
and override
access to the Application. The user can access any Event in the Application's destination cluster if they know the involved object's name, UID, and namespace.
Impacts for versions starting with v0.8.0
The same bug exists starting with v0.8.0, but only the following exploits were possible before v1.0.0:
- The
delete exploit
(#2 above). - The logs exploit (#4 above).
- The Events exploit described above.
Impacts for versions starting with v0.5.0
The same bug exists starting with v0.5.0 (when RBAC was implemented), but only the Events exploit described above was possible before v0.8.0.
Patches A patch for this vulnerability has been released in the following Argo CD versions:
- v2.3.2
- v2.2.8
- v2.1.14
Versions 2.0.x and earlier users: See the changelog for links to upgrade instructions for your version. It is imperative to upgrade quickly, but some limited mitigations are described in the next section.
argo-helm chart users: Argo CD users deploying v2.3.x with argo-helm can upgrade the chart to version 4.2.2. Argo CD 2.2 and 2.1 users can set the global.image.tag value to the latest in your current release series (v2.2.8, or v2.1.14). Since charts for the 2.2 and 2.1 series are no longer maintained, you will need to either leave the value override in place or upgrade to the 4.x chart series (and therefore to Argo CD 2.3).
Workarounds
The only certain way to avoid the vulnerability is to upgrade.
Mitigations
- To avoid privilege escalation:
- Limit who has push access to Application source repositories or sync + override access to Applications.
- Limit which repositories are available in projects where users have update access to Applications.
- To avoid unauthorized resource inspection/tampering:
- Limit who has delete, get, or action access to Applications.
These mitigations can help limit potential damage, but they are not a substitute for upgrading. It is necessary to upgrade immediately.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/argoproj/argo-cd" }, "ranges": [ { "events": [ { "introduced": "0.5.0" }, { "last_affected": "1.8.7" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/argoproj/argo-cd/v2" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.1.14" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/argoproj/argo-cd/v2" }, "ranges": [ { "events": [ { "introduced": "2.2.0" }, { "fixed": "2.2.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/argoproj/argo-cd/v2" }, "ranges": [ { "events": [ { "introduced": "2.3.0" }, { "fixed": "2.3.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-1025" ], "database_specific": { "cwe_ids": [ "CWE-1220", "CWE-284", "CWE-863" ], "github_reviewed": true, "github_reviewed_at": "2022-07-21T22:29:13Z", "nvd_published_at": "2022-07-12T21:15:00Z", "severity": "HIGH" }, "details": "# Impact\n\n## Impacts for versions starting with v1.0.0\nAll unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.\n\nTo perform the following exploits, an authorized Argo CD user must have push access to an Application\u0027s source git or Helm repository or `sync` and `override` access to an Application. Once a user has that access, different exploitation levels are possible depending on their other RBAC privileges:\n\n1. If that user has `update` access to the Application, they can modify any resource on the Application\u0027s destination cluster. If the destination cluster is or can be made to be the same as the cluster hosting Argo CD, the user can escalate their Argo CD permissions to admin-level.\n2. If the user has `delete` access to the Application, they can delete any resource on the Application\u0027s destination cluster. (This exploit is possible starting with v0.8.0.)\n3. If the user has `get` access to the Application, they can view any resource on the Application\u0027s destination cluster (except for the contents of Secrets) and list [actions](https://argo-cd.readthedocs.io/en/stable/operator-manual/resource_actions/) available for that resource.\n4. If the user has `get` access to the Application, they can view the logs of any Pods on the Application\u0027s destination cluster.\n5. If the user has `action/{some action or *}` access on the Application, they can run an action for any resource (which supports the allowed action(s)) on the Application\u0027s destination cluster. (Some actions are available in Argo CD by default, and others may be configured by an Argo CD admin.)\n\nSee the [Argo CD RBAC documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#rbac-resources-and-actions) for an explanation of the privileges available in Argo CD.\n\n## Events exploit\nA related exploit is possible for a user with `get` access to an Application **even if they do not have access to the Application\u0027s source git or Helm repository or `sync` and `override` access to the Application**. The user can access any Event in the Application\u0027s destination cluster if they know the involved object\u0027s name, UID, and namespace.\n\n## Impacts for versions starting with v0.8.0\nThe same bug exists starting with v0.8.0, but only the following exploits were possible before v1.0.0:\n\n- The `delete exploit` (#\u20602 above).\n- The logs exploit (#\u20604 above).\n- The Events exploit described above.\n\n## Impacts for versions starting with v0.5.0\nThe same bug exists starting with v0.5.0 (when RBAC was implemented), but only the Events exploit described above was possible before v0.8.0.\n\nPatches\nA patch for this vulnerability has been released in the following Argo CD versions:\n\n- v2.3.2\n- v2.2.8\n- v2.1.14\n\n**Versions 2.0.x and earlier users**: See the changelog for links to upgrade instructions for your version. It is imperative to upgrade quickly, but some limited mitigations are described in the next section.\n\n**argo-helm chart users**: Argo CD users deploying v2.3.x with argo-helm can upgrade the chart to version 4.2.2. Argo CD 2.2 and 2.1 users can set the global.image.tag value to the latest in your current release series (v2.2.8, or v2.1.14). Since charts for the 2.2 and 2.1 series are no longer maintained, you will need to either leave the value override in place or upgrade to the 4.x chart series (and therefore to Argo CD 2.3).\n\n## Workarounds\nThe only certain way to avoid the vulnerability is to upgrade.\n\n## Mitigations\n\n- To avoid privilege escalation:\n - Limit who has push access to Application source repositories or sync + override access to Applications.\n- Limit which repositories are available in projects where users have update access to Applications.\n - To avoid unauthorized resource inspection/tampering:\n - Limit who has delete, get, or action access to Applications.\n\nThese mitigations can help limit potential damage, but they are not a substitute for upgrading. It is necessary to upgrade immediately.", "id": "GHSA-96jv-vj39-x4j6", "modified": "2023-06-27T20:58:57Z", "published": "2022-07-13T00:00:41Z", "references": [ { "type": "WEB", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025" }, { "type": "WEB", "url": "https://github.com/argoproj/argo-cd/commit/af03b291d4b7e9d3ce9a6580ae9c8141af0e05cf" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2022:1039" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2022:1040" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2022:1041" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2022:1042" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2022-1025" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "type": "PACKAGE", "url": "https://github.com/argoproj/argo-cd" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Argo CD improper access control bug can allow malicious user to escalate privileges to admin level" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.