"High-Severity Flaw in Argo CD Is Information Leak Risk"

The exploitation of a high-severity security flaw in the popular open-source Continuous Delivery (CD) tool for Kubernetes, Argo CD, could allow an attacker to access sensitive information contained by target applications. Argo CD monitors running applications and compares their live state, which helps administrators synchronize applications with their preferred state. The vulnerability, tracked as CVE-2022-24348, is a path traversal bug that enables an attacker to load a Kubernetes Helm Chart YAML file and access another application's information. Such files, which are used when building a new deployment pipeline, contain metadata and information needed for the deployment and the ability to update the cloud configuration. Using this vulnerability, an attacker could pass arbitrary value files to Helm Charts or craft special Helm Chart packages containing value files that are symbolic links pointing to arbitrary files outside the repository's root directory. The platform's maintainers say that an attacker would need to have permissions to create or update applications as well as know the full path to a file containing valid YAML in order to exploit the vulnerability. Argo CD v2.3.0, v2.2.4, and v2.1.9 releases have a fix that addresses the vulnerability by preventing value files outside the repository root. This article continues to discuss the potential impact and exploitation of the Argo CD flaw. 

Security Week reports "High-Severity Flaw in Argo CD Is Information Leak Risk"

Submitted by Anonymous on