U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-24768 Detail

Description

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All unpatched versions of Argo CD starting with 1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level. Versions starting with 0.8.0 and 0.5.0 contain limited versions of this issue. To perform exploits, an authorized Argo CD user must have push access to an Application's source git or Helm repository or `sync` and `override` access to an Application. Once a user has that access, different exploitation levels are possible depending on their other RBAC privileges. A patch for this vulnerability has been released in Argo CD versions 2.3.2, 2.2.8, and 2.1.14. Some mitigation measures are available but do not serve as a substitute for upgrading. To avoid privilege escalation, limit who has push access to Application source repositories or `sync` + `override` access to Applications; and limit which repositories are available in projects where users have `update` access to Applications. To avoid unauthorized resource inspection/tampering, limit who has `delete`, `get`, or `action` access to Applications.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://github.com/argoproj/argo-cd/commit/af03b291d4b7e9d3ce9a6580ae9c8141af0e05cf Patch  Third Party Advisory 
https://github.com/argoproj/argo-cd/commit/af03b291d4b7e9d3ce9a6580ae9c8141af0e05cf Patch  Third Party Advisory 
https://github.com/argoproj/argo-cd/releases/tag/v2.1.14 Release Notes  Third Party Advisory 
https://github.com/argoproj/argo-cd/releases/tag/v2.1.14 Release Notes  Third Party Advisory 
https://github.com/argoproj/argo-cd/releases/tag/v2.2.8 Release Notes  Third Party Advisory 
https://github.com/argoproj/argo-cd/releases/tag/v2.2.8 Release Notes  Third Party Advisory 
https://github.com/argoproj/argo-cd/releases/tag/v2.3.2 Release Notes  Third Party Advisory 
https://github.com/argoproj/argo-cd/releases/tag/v2.3.2 Release Notes  Third Party Advisory 
https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww Mitigation  Third Party Advisory 
https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww Mitigation  Third Party Advisory 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-862 Missing Authorization cwe source acceptance level NIST  
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor GitHub, Inc.  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

7 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-24768
NVD Published Date:
03/23/2022
NVD Last Modified:
11/21/2024
Source:
GitHub, Inc.