CVE-2023-23947
February 16, 2023
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All Argo CD versions starting with 2.3.0-rc1 and prior to 2.3.17, 2.4.23 2.5.11, and 2.6.2 are vulnerable to an improper authorization bug which allows users who have the ability to update at least one cluster secret to update any cluster secret. The attacker could use this access to escalate privileges (potentially controlling Kubernetes resources) or to break Argo CD functionality (by preventing connections to external clusters). A patch for this vulnerability has been released in Argo CD versions 2.6.2, 2.5.11, 2.4.23, and 2.3.17. Two workarounds are available. Either modify the RBAC configuration to completely revoke all "clusters, update" access, or use the "destinations" and "clusterResourceWhitelist" fields to apply similar restrictions as the "namespaces" and "clusterResources" fields.
Affected Packages
github.com/argoproj/argo-cd (GO):
Affected version(s) >=v2.6.0 <v2.6.2Fix Suggestion:
Update to version v2.6.2github.com/argoproj/argo-cd (GO):
Affected version(s) >=v2.5.0 <v2.5.11Fix Suggestion:
Update to version v2.5.11github.com/argoproj/argo-cd (GO):
Affected version(s) >=v2.3.0 <v2.3.17Fix Suggestion:
Update to version v2.3.17github.com/argoproj/argo-cd (GO):
Affected version(s) >=v2.4.0 <v2.4.23Fix Suggestion:
Update to version v2.4.23Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
9.4
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
HIGH
Subsequent System Availability
HIGH
CVSS v3
Base Score:
9.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Incorrect Authorization
EPSS
Base Score:
0.35