You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
Argo CD is a declarative continuous deployment framework for Kubernetes. In Argo CD versions prior to 2.3 (starting at least in v0.1.0, but likely in any version using Helm before 2.3), using a specifically-crafted Helm file could reference external Helm charts handled by the same repo-server to leak values, or files from the referenced Helm Chart. This was possible because Helm paths were predictable. The vulnerability worked by adding a Helm chart that referenced Helm resources from predictable paths. Because the paths of Helm charts were predictable and available on an instance of repo-server, it was possible to reference and then render the values and resources from other existing Helm charts regardless of permissions. While generally, secrets are not stored in these files, it was nevertheless possible to reference any values from these charts. This issue was fixed in Argo CD 2.3 and subsequent versions by randomizing Helm paths. User's still using Argo CD 2.3 or below are advised to update to a supported version. If this is not possible, disabling Helm chart rendering, or using an additional repo-server for each Helm chart would prevent possible exploitation.
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/argoproj/argo-cd
vulnerable_at: 1.8.6
packages:
- package: argo-cd
description: |-
Argo CD is a declarative continuous deployment framework for Kubernetes. In Argo
CD versions prior to 2.3 (starting at least in v0.1.0, but likely in any version
using Helm before 2.3), using a specifically-crafted Helm file could reference
external Helm charts handled by the same repo-server to leak values, or files
from the referenced Helm Chart. This was possible because Helm paths were
predictable. The vulnerability worked by adding a Helm chart that referenced
Helm resources from predictable paths. Because the paths of Helm charts were
predictable and available on an instance of repo-server, it was possible to
reference and then render the values and resources from other existing Helm
charts regardless of permissions. While generally, secrets are not stored in
these files, it was nevertheless possible to reference any values from these
charts. This issue was fixed in Argo CD 2.3 and subsequent versions by
randomizing Helm paths. User's still using Argo CD 2.3 or below are advised to
update to a supported version. If this is not possible, disabling Helm chart
rendering, or using an additional repo-server for each Helm chart would prevent
possible exploitation.
cves:
- CVE-2023-40026
references:
- advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-6jqw-jwf5-rp8h
- web: https://argo-cd.readthedocs.io/en/stable/operator-manual/installation/#supported-versions
The text was updated successfully, but these errors were encountered:
CVE-2023-40026 references github.com/argoproj/argo-cd, which may be a Go module.
Description:
Argo CD is a declarative continuous deployment framework for Kubernetes. In Argo CD versions prior to 2.3 (starting at least in v0.1.0, but likely in any version using Helm before 2.3), using a specifically-crafted Helm file could reference external Helm charts handled by the same repo-server to leak values, or files from the referenced Helm Chart. This was possible because Helm paths were predictable. The vulnerability worked by adding a Helm chart that referenced Helm resources from predictable paths. Because the paths of Helm charts were predictable and available on an instance of repo-server, it was possible to reference and then render the values and resources from other existing Helm charts regardless of permissions. While generally, secrets are not stored in these files, it was nevertheless possible to reference any values from these charts. This issue was fixed in Argo CD 2.3 and subsequent versions by randomizing Helm paths. User's still using Argo CD 2.3 or below are advised to update to a supported version. If this is not possible, disabling Helm chart rendering, or using an additional repo-server for each Helm chart would prevent possible exploitation.
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: