In Argo versions prior to v1.5.0-rc1, it was possible for authenticated Argo users to submit API calls to retrieve secrets and other manifests which were stored within git.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://github.com/argoproj/argo-cd/blob/a1afe44066fcd0a0ab90a02a23177164bbad42cf/util/diff/diff.go#L399 | third party advisory exploit |
https://github.com/argoproj/argo-cd/issues/470 | third party advisory |
https://github.com/argoproj/argo-cd/pull/3088 | third party advisory patch |
https://www.soluble.ai/blog/argo-cves-2020 | third party advisory exploit |