Action not permitted
Modal body text goes here.
CVE-2022-24730
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.144Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "argo-cd", "vendor": "argoproj", "versions": [ { "status": "affected", "version": "\u003e= 1.3.0, \u003c 2.1.11" }, { "status": "affected", "version": "\u003e= 2.2.0, \u003c 2.2.6" }, { "status": "affected", "version": "\u003e= 2.3.0-rc1, \u003c 2.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.3.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD\u0027s repo-server. A malicious Argo CD user who has been granted `get` access for a repository containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from other Applications\u0027 source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The patches prevent path traversal and limit access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges and are requesting details for a `repo_url` that has already been used for the given Application. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-23T21:05:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v" } ], "source": { "advisory": "GHSA-r9cr-hvjj-496v", "discovery": "UNKNOWN" }, "title": "Path traversal and improper access control allows leaking out-of-bound files from Argo CD repo-server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24730", "STATE": "PUBLIC", "TITLE": "Path traversal and improper access control allows leaking out-of-bound files from Argo CD repo-server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "argo-cd", "version": { "version_data": [ { "version_value": "\u003e= 1.3.0, \u003c 2.1.11" }, { "version_value": "\u003e= 2.2.0, \u003c 2.2.6" }, { "version_value": "\u003e= 2.3.0-rc1, \u003c 2.3.0" } ] } } ] }, "vendor_name": "argoproj" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.3.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD\u0027s repo-server. A malicious Argo CD user who has been granted `get` access for a repository containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from other Applications\u0027 source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The patches prevent path traversal and limit access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges and are requesting details for a `repo_url` that has already been used for the given Application. There are currently no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-284: Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v", "refsource": "CONFIRM", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v" } ] }, "source": { "advisory": "GHSA-r9cr-hvjj-496v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24730", "datePublished": "2022-03-23T20:50:09", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-24730\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-03-23T21:15:08.023\",\"lastModified\":\"2024-08-07T15:43:51.540\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.3.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD\u0027s repo-server. A malicious Argo CD user who has been granted `get` access for a repository containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from other Applications\u0027 source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The patches prevent path traversal and limit access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges and are requesting details for a `repo_url` that has already been used for the given Application. There are currently no known workarounds.\"},{\"lang\":\"es\",\"value\":\"Argo CD es una herramienta declarativa de entrega continua GitOps para Kubernetes. Argo CD a partir de la versi\u00f3n 1.3.0 pero antes de las versiones 2.1.11, 2.2.6 y 2.3.0 es vulnerable a un fallo de salto de ruta, agravado por un fallo de control de acceso inapropiado, que permite a un usuario malicioso con acceso al repositorio de s\u00f3lo lectura filtrar archivos confidenciales del repo-servidor de Argo CD. Un usuario malicioso de Argo CD al que le haya sido concedido acceso \\\"get\\\" para un repositorio que contenga un gr\u00e1fico de Helm puede dise\u00f1ar una petici\u00f3n de API al endpoint \\\"/api/v1/repositories/{repo_url}/appdetails\\\" para filtrar el contenido de archivos fuera de l\u00edmites del servidor de repositorios. La carga \u00fatil maliciosa har\u00eda referencia a un archivo fuera de l\u00edmites, y el contenido de ese archivo ser\u00eda devuelto como parte de la respuesta. El contenido de un archivo no YAML puede ser devuelto como parte de un mensaje de error. El atacante tendr\u00eda que conocer o adivinar la ubicaci\u00f3n del archivo de destino. Los archivos confidenciales que podr\u00edan filtrarse incluyen archivos de los repositorios de fuentes de otras aplicaciones o cualquier secreto que haya sido montado como archivo en el servidor de repositorios. Esta vulnerabilidad est\u00e1 parcheada en las versiones 2.1.11, 2.2.6 y 2.3.0 de Argo CD. Los parches evitan el salto de ruta y limitan el acceso a usuarios que, o bien A) han recibido privilegios \\\"create\\\" de aplicaciones, o bien B) han recibido privilegios \\\"get\\\" de aplicaciones y est\u00e1n solicitando detalles para una \\\"repo_url\\\" que ya ha sido usada para la aplicaci\u00f3n en cuesti\u00f3n. Actualmente no se presentan medidas de mitigaci\u00f3n conocidas\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"},{\"lang\":\"en\",\"value\":\"CWE-863\"}]},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"},{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.3.0\",\"versionEndExcluding\":\"2.1.11\",\"matchCriteriaId\":\"E1786BA5-590E-495A-BF42-6A73F927B50B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.2.0\",\"versionEndExcluding\":\"2.2.6\",\"matchCriteriaId\":\"3BF852EA-7214-413B-9E72-DFB0165067B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:argoproj:argo_cd:2.3.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FA0E90D-79C0-4F34-8FB5-061073BCEEA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:argoproj:argo_cd:2.3.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"794935A2-5EF6-4514-9B2B-D06AF10B2EA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:argoproj:argo_cd:2.3.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"401CAF1A-8BCC-446F-8C4D-53753BAC8BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:argoproj:argo_cd:2.3.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBD86381-9064-4D50-B740-81E6680C6131\"}]}]}],\"references\":[{\"url\":\"https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-r9cr-hvjj-496v
Vulnerability from github
Impact
All unpatched versions of Argo CD starting with v1.3.0 are vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD's repo-server.
A malicious Argo CD user who has been granted get
access for a repository containing a Helm chart can craft an API request to the /api/v1/repositories/{repo_url}/appdetails
endpoint to leak the contents of out-of-bounds files from the repo-server.
The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file.
Sensitive files which could be leaked include files from other Applications' source repositories (potentially decrypted files, if you are using a decryption plugin) or any secrets which have been mounted as files on the repo-server.
Patches
A patch for this vulnerability has been released in the following Argo CD versions:
- v2.3.0
- v2.2.6
- v2.1.11
The patches do two things:
1) prevent path traversal
2) limit /api/v1/repositories/{repo_url}/appdetails
access to users who either A) have been granted Application create
privileges or B) have been granted Application get
privileges and are requesting details for a repo_url
that has already been used for the given Application
Workarounds
The only certain way to avoid the vulnerability is to upgrade.
To mitigate the problem, you can
* avoid storing secrets in git
* avoid mounting secrets as files on the repo-server
* avoid decrypting secrets into files on the repo-server
* carefully limit who has get
access for repositories
References
For more information
Open an issue in the Argo CD issue tracker or discussions Join us on Slack in channel #argo-cd
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/argoproj/argo-cd" }, "ranges": [ { "events": [ { "introduced": "1.3.0" }, { "fixed": "2.1.11" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/argoproj/argo-cd" }, "ranges": [ { "events": [ { "introduced": "2.2.0" }, { "fixed": "2.2.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/argoproj/argo-cd" }, "ranges": [ { "events": [ { "introduced": "2.3.0-rc1" }, { "fixed": "2.3.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-24730" ], "database_specific": { "cwe_ids": [ "CWE-22", "CWE-284" ], "github_reviewed": true, "github_reviewed_at": "2022-03-24T00:04:03Z", "nvd_published_at": "2022-03-23T21:15:00Z", "severity": "HIGH" }, "details": "### Impact\n\nAll unpatched versions of Argo CD starting with v1.3.0 are vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD\u0027s repo-server.\n\nA malicious Argo CD user who has been granted [`get` access for a repository](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#rbac-resources-and-actions) containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server.\n\nThe malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file.\n\nSensitive files which could be leaked include files from other Applications\u0027 source repositories (potentially decrypted files, if you are using a decryption plugin) or any secrets which have been mounted as files on the repo-server.\n\n### Patches\n\nA patch for this vulnerability has been released in the following Argo CD versions:\n\n* v2.3.0\n* v2.2.6\n* v2.1.11\n\nThe patches do two things:\n 1) prevent path traversal\n 2) limit `/api/v1/repositories/{repo_url}/appdetails` access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges _and_ are requesting details for a `repo_url` that has already been used for the given Application\n\n### Workarounds\n\nThe only certain way to avoid the vulnerability is to upgrade. \n\nTo mitigate the problem, you can \n* avoid storing secrets in git\n* avoid mounting secrets as files on the repo-server\n* avoid decrypting secrets into files on the repo-server\n* carefully [limit who has `get` access for repositories](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#rbac-resources-and-actions)\n\n### References\n\n* [Security documentation for the repo-server component](https://argo-cd.readthedocs.io/en/stable/operator-manual/security/#git-helm-repositories)\n* [Argo CD RBAC configuration documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#)\n\n### For more information\n\nOpen an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)\nJoin us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd\n", "id": "GHSA-r9cr-hvjj-496v", "modified": "2022-03-24T00:04:03Z", "published": "2022-03-24T00:04:03Z", "references": [ { "type": "WEB", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730" }, { "type": "PACKAGE", "url": "https://github.com/argoproj/argo-cd" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Path traversal and improper access control allows leaking out-of-bound files from Argo CD repo-server" }
rhsa-2022_1039
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openshift-gitops-applicationset-container, openshift-gitops-container, openshift-gitops-kam-delivery-container, and openshift-gitops-operator-container is now available for Red Hat OpenShift GitOps 1.2. (GitOps v1.2.3)\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.\n\nSecurity Fix(es):\n\n* Openshift-Gitops: Improper access control allows admin privilege escalation (CVE-2022-1025)\n\n* argocd: path traversal and improper access control allows leaking out-of-bound files (CVE-2022-24730)\n\n* argocd: path traversal allows leaking out-of-bound files (CVE-2022-24731)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1039", "url": "https://access.redhat.com/errata/RHSA-2022:1039" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1039.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift GitOps security update", "tracking": { "current_release_date": "2024-11-22T18:38:47+00:00", "generator": { "date": "2024-11-22T18:38:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1039", "initial_release_date": "2022-03-23T21:19:59+00:00", "revision_history": [ { "date": "2022-03-23T21:19:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-23T21:19:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T18:38:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift GitOps 1.2", "product": { "name": "Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_gitops:1.2::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift GitOps" }, { "branches": [ { "category": "product_version", "name": "openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "product": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "product_id": "openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "product_identification_helper": { "purl": "pkg:oci/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/applicationset-rhel8\u0026tag=v1.2.3-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64", "product": { "name": "openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64", "product_id": "openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64", "product_identification_helper": { "purl": "pkg:oci/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.2.3-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "product_id": "openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.2.3-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64", "product": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64", "product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64", "product_identification_helper": { "purl": "pkg:oci/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.2.3-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "product": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "product_id": "openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-operator-bundle\u0026tag=v1.2.3-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.2.3-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64 as a component of Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64" }, "product_reference": "openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "relates_to_product_reference": "8Base-GitOps-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64 as a component of Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" }, "product_reference": "openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64", "relates_to_product_reference": "8Base-GitOps-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64 as a component of Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64" }, "product_reference": "openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "relates_to_product_reference": "8Base-GitOps-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64 as a component of Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "relates_to_product_reference": "8Base-GitOps-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64 as a component of Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "relates_to_product_reference": "8Base-GitOps-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64 as a component of Red Hat OpenShift GitOps 1.2", "product_id": "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" }, "product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64", "relates_to_product_reference": "8Base-GitOps-1.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1025", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064682" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in ArgoCD. This flaw allows a malicious user who has push access to an application\u0027s source git or Helm repository, or sync and override access, to perform actions they are not authorized to do. \r\n\r\nFor example, if the attacker has `update` or `delete` access, they can modify or delete any resource on the destination cluster and escalate ArgoCD privileges to the admin level. If the attacker has `get` access, they can view and list actions for any resource on the destination cluster except secrets and view the logs of any pods on the destination cluster. If the attacker has action/{some action or *} access on the application, they can run an action for any resource that supports the allowed action on the application\u0027s destination cluster.", "title": "Vulnerability description" }, { "category": "summary", "text": "Openshift-Gitops: Improper access control allows admin privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ], "known_not_affected": [ "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1025" }, { "category": "external", "summary": "RHBZ#2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1025", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:19:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1039" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Openshift-Gitops: Improper access control allows admin privilege escalation" }, { "cve": "CVE-2022-24730", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062751" } ], "notes": [ { "category": "description", "text": "A flaw was found in ArgoCD. This flaw allows an attacker with read-only repository access to leak files from the repo server that the attacker should not have access to. An attacker can send a crafted request to retrieve file contents. This issue results in the disclosure of sensitive information to an unauthorized actor and compromises data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal and improper access control allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ], "known_not_affected": [ "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24730" }, { "category": "external", "summary": "RHBZ#2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24730", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24730" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:19:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1039" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal and improper access control allows leaking out-of-bound files" }, { "cve": "CVE-2022-24731", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062755" } ], "notes": [ { "category": "description", "text": "A path traversal flaw was found in ArgoCD. This flaw allows an attacker who has been granted create or update access to applications to leak the contents of any text file on the repo-server by crafting a malicious Helm chart. Such text files could include sensitive information that the attacker should not have access to, compromising data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ], "known_not_affected": [ "8Base-GitOps-1.2:openshift-gitops-1/applicationset-rhel8@sha256:e49c75d1232404c64e6a61d5ffed3ed4850d8309fa8a0d17c66d59f4bdadce8e_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-operator-bundle@sha256:57c0b68364294a996bd7faae39c302cb0e127737a33352af0c7841bd4768fe0b_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8-operator@sha256:1dbc15afdf7f21dc78bd554987deab3ee0e61154ce0902a2f47bffdd20610eae_amd64", "8Base-GitOps-1.2:openshift-gitops-1/gitops-rhel8@sha256:8eb80ce4bf7e74bce7b63f88c78d95b5641a8e323c43fbbc1dbeea13630a5d3f_amd64", "8Base-GitOps-1.2:openshift-gitops-1/kam-delivery-rhel8@sha256:c0ba402582511a6a0469eea64e8c483b954aef5e00cca01117161e465871c74e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24731" }, { "category": "external", "summary": "RHBZ#2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:19:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1039" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.2:openshift-gitops-1/argocd-rhel8@sha256:e2f2749885671968d301a18952cc44269779775f40bd31cde210ade6b3cb6937_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal allows leaking out-of-bound files" } ] }
rhsa-2022_1040
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift GitOps 1.3\n\nOpenShift GitOps v1.3.5 for OCP 4.6\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.\n\nSecurity Fix(es):\n\n* Openshift-Gitops: Improper access control allows admin privilege escalation (CVE-2022-1025)\n\n* argocd: path traversal and improper access control allows leaking out-of-bound files (CVE-2022-24730)\n\n* argocd: path traversal allows leaking out-of-bound files (CVE-2022-24731)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1040", "url": "https://access.redhat.com/errata/RHSA-2022:1040" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1040.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift GitOps security update", "tracking": { "current_release_date": "2024-11-22T18:38:56+00:00", "generator": { "date": "2024-11-22T18:38:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1040", "initial_release_date": "2022-03-23T21:17:24+00:00", "revision_history": [ { "date": "2022-03-23T21:17:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-23T21:17:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T18:38:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift GitOps 1.3", "product": { "name": "Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_gitops:1.3::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift GitOps" }, { "branches": [ { "category": "product_version", "name": "openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "product": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "product_id": "openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "product_identification_helper": { "purl": "pkg:oci/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/applicationset-rhel8\u0026tag=v1.3.5-4" } } }, { "category": "product_version", "name": "openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64", "product": { "name": "openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64", "product_id": "openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64", "product_identification_helper": { "purl": "pkg:oci/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.3.5-4" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "product_id": "openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.3.5-4" } } }, { "category": "product_version", "name": "openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "product": { "name": "openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "product_id": "openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "product_identification_helper": { "purl": "pkg:oci/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/dex-rhel8\u0026tag=v1.3.5-4" } } }, { "category": "product_version", "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64", "product": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64", "product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64", "product_identification_helper": { "purl": "pkg:oci/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.3.5-4" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "product": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "product_id": "openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-operator-bundle\u0026tag=v1.3.5-4" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.3.5-4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64" }, "product_reference": "openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" }, "product_reference": "openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64" }, "product_reference": "openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64" }, "product_reference": "openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" }, "product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1025", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064682" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in ArgoCD. This flaw allows a malicious user who has push access to an application\u0027s source git or Helm repository, or sync and override access, to perform actions they are not authorized to do. \r\n\r\nFor example, if the attacker has `update` or `delete` access, they can modify or delete any resource on the destination cluster and escalate ArgoCD privileges to the admin level. If the attacker has `get` access, they can view and list actions for any resource on the destination cluster except secrets and view the logs of any pods on the destination cluster. If the attacker has action/{some action or *} access on the application, they can run an action for any resource that supports the allowed action on the application\u0027s destination cluster.", "title": "Vulnerability description" }, { "category": "summary", "text": "Openshift-Gitops: Improper access control allows admin privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ], "known_not_affected": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1025" }, { "category": "external", "summary": "RHBZ#2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1025", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:17:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Openshift-Gitops: Improper access control allows admin privilege escalation" }, { "cve": "CVE-2022-24730", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062751" } ], "notes": [ { "category": "description", "text": "A flaw was found in ArgoCD. This flaw allows an attacker with read-only repository access to leak files from the repo server that the attacker should not have access to. An attacker can send a crafted request to retrieve file contents. This issue results in the disclosure of sensitive information to an unauthorized actor and compromises data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal and improper access control allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ], "known_not_affected": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24730" }, { "category": "external", "summary": "RHBZ#2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24730", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24730" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:17:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal and improper access control allows leaking out-of-bound files" }, { "cve": "CVE-2022-24731", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062755" } ], "notes": [ { "category": "description", "text": "A path traversal flaw was found in ArgoCD. This flaw allows an attacker who has been granted create or update access to applications to leak the contents of any text file on the repo-server by crafting a malicious Helm chart. Such text files could include sensitive information that the attacker should not have access to, compromising data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ], "known_not_affected": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:8657efb2f6b32a4756735444a9604fae703ee8557d715523bb4a45937d3cfb64_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:8b0597884cbe0f0cfa4f997bacffa1257640f6ec0508709c277f420b91c77dcc_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:98d5cfa73f1fa925cf9581613427a34f9077103189ae5125a62b7213ff92c16f_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:b839e60eef40851450d39f9718f843310c1cc86310ca0781716824dc79ac1c67_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:5ab8d41cd75bf7103f2c42e6aa2db0d2d19a2a01675cc3b1219db1b8dc55ecd0_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:4ad5448b0bf1fe1b445d04bc0feefe2ce82944709fc750cb1c0a6bb61722d52d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24731" }, { "category": "external", "summary": "RHBZ#2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:17:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:845ddc4f9d3a5e546a4ed37a544339cb74b2a1ab3b03f338129c7900028074ad_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal allows leaking out-of-bound files" } ] }
rhsa-2022_1042
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift GitOps 1.3\n\nOpenShift GitOps v1.3.6 for OCP 4.7+\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.\n\nSecurity Fix(es):\n\n* Openshift-Gitops: Improper access control allows admin privilege escalation\n(CVE-2022-1025)\n\n* argocd: path traversal and improper access control allows leaking out-of-bound\nfiles (CVE-2022-24730)\n\n* argocd: path traversal allows leaking out-of-bound files (CVE-2022-24731)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1042", "url": "https://access.redhat.com/errata/RHSA-2022:1042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1042.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift GitOps security update", "tracking": { "current_release_date": "2024-11-22T18:38:39+00:00", "generator": { "date": "2024-11-22T18:38:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1042", "initial_release_date": "2022-03-23T21:53:20+00:00", "revision_history": [ { "date": "2022-03-23T21:53:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-23T21:53:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T18:38:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift GitOps 1.3", "product": { "name": "Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_gitops:1.3::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift GitOps" }, { "branches": [ { "category": "product_version", "name": "openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "product": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "product_id": "openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "product_identification_helper": { "purl": "pkg:oci/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/applicationset-rhel8\u0026tag=v1.3.6-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64", "product": { "name": "openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64", "product_id": "openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64", "product_identification_helper": { "purl": "pkg:oci/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.3.6-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "product_id": "openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.3.6-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "product": { "name": "openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "product_id": "openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "product_identification_helper": { "purl": "pkg:oci/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/dex-rhel8\u0026tag=v1.3.6-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64", "product": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64", "product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64", "product_identification_helper": { "purl": "pkg:oci/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.3.6-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "product": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "product_id": "openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-operator-bundle\u0026tag=v1.3.6-3" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.3.6-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64" }, "product_reference": "openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" }, "product_reference": "openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64" }, "product_reference": "openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64" }, "product_reference": "openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64 as a component of Red Hat OpenShift GitOps 1.3", "product_id": "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" }, "product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64", "relates_to_product_reference": "8Base-GitOps-1.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1025", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064682" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in ArgoCD. This flaw allows a malicious user who has push access to an application\u0027s source git or Helm repository, or sync and override access, to perform actions they are not authorized to do. \r\n\r\nFor example, if the attacker has `update` or `delete` access, they can modify or delete any resource on the destination cluster and escalate ArgoCD privileges to the admin level. If the attacker has `get` access, they can view and list actions for any resource on the destination cluster except secrets and view the logs of any pods on the destination cluster. If the attacker has action/{some action or *} access on the application, they can run an action for any resource that supports the allowed action on the application\u0027s destination cluster.", "title": "Vulnerability description" }, { "category": "summary", "text": "Openshift-Gitops: Improper access control allows admin privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ], "known_not_affected": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1025" }, { "category": "external", "summary": "RHBZ#2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1025", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:53:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Openshift-Gitops: Improper access control allows admin privilege escalation" }, { "cve": "CVE-2022-24730", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062751" } ], "notes": [ { "category": "description", "text": "A flaw was found in ArgoCD. This flaw allows an attacker with read-only repository access to leak files from the repo server that the attacker should not have access to. An attacker can send a crafted request to retrieve file contents. This issue results in the disclosure of sensitive information to an unauthorized actor and compromises data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal and improper access control allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ], "known_not_affected": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24730" }, { "category": "external", "summary": "RHBZ#2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24730", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24730" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:53:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal and improper access control allows leaking out-of-bound files" }, { "cve": "CVE-2022-24731", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062755" } ], "notes": [ { "category": "description", "text": "A path traversal flaw was found in ArgoCD. This flaw allows an attacker who has been granted create or update access to applications to leak the contents of any text file on the repo-server by crafting a malicious Helm chart. Such text files could include sensitive information that the attacker should not have access to, compromising data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ], "known_not_affected": [ "8Base-GitOps-1.3:openshift-gitops-1/applicationset-rhel8@sha256:f965937f6050138fa288b25b0111c518ff836c543e61da5a8a24c575a663c94b_amd64", "8Base-GitOps-1.3:openshift-gitops-1/dex-rhel8@sha256:d8026dc27343a2db9871a5f3091eda1e7296bfb695ec73c4e528f660bc97f217_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-operator-bundle@sha256:298334efb11a7ae3bbefa376070e13c8a295fbb302eb9ccdcebfc67739257c26_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8-operator@sha256:413581a8e996ffa0b579533844a42feb23bb9fe7324fec8051cbde7739b4c9ce_amd64", "8Base-GitOps-1.3:openshift-gitops-1/gitops-rhel8@sha256:db788008a70be455c1d45c0d31590c947e2875b5b87fb0019d192bdb2a205bb6_amd64", "8Base-GitOps-1.3:openshift-gitops-1/kam-delivery-rhel8@sha256:8db428b93736c09230253726b89c27cee9628a7e2b0dd87a093f20c4875d86cb_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24731" }, { "category": "external", "summary": "RHBZ#2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:53:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.3:openshift-gitops-1/argocd-rhel8@sha256:91e6b1300ddb1fc127cf90435e77dd0680b231baa34950d85bc80723a834f911_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal allows leaking out-of-bound files" } ] }
rhsa-2022_1041
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift GitOps 1.4\n\nOpenShift GitOps v1.4.4\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.\n\nSecurity Fix(es):\n\n* Openshift-Gitops: Improper access control allows admin privilege escalation\n(CVE-2022-1025)\n\n* argocd: path traversal and improper access control allows leaking out-of-bound\nfiles (CVE-2022-24730)\n\n* argocd: path traversal allows leaking out-of-bound files (CVE-2022-24731)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1041", "url": "https://access.redhat.com/errata/RHSA-2022:1041" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1041.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift GitOps security update", "tracking": { "current_release_date": "2024-11-22T18:38:31+00:00", "generator": { "date": "2024-11-22T18:38:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1041", "initial_release_date": "2022-03-23T21:18:40+00:00", "revision_history": [ { "date": "2022-03-23T21:18:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-23T21:18:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T18:38:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift GitOps 1.4", "product": { "name": "Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_gitops:1.4::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift GitOps" }, { "branches": [ { "category": "product_version", "name": "openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "product": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "product_id": "openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "product_identification_helper": { "purl": "pkg:oci/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/applicationset-rhel8\u0026tag=v1.4.4-6" } } }, { "category": "product_version", "name": "openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64", "product": { "name": "openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64", "product_id": "openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64", "product_identification_helper": { "purl": "pkg:oci/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.4.4-6" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "product_id": "openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.4.4-6" } } }, { "category": "product_version", "name": "openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "product": { "name": "openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "product_id": "openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "product_identification_helper": { "purl": "pkg:oci/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/dex-rhel8\u0026tag=v1.4.4-6" } } }, { "category": "product_version", "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64", "product": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64", "product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64", "product_identification_helper": { "purl": "pkg:oci/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.4.4-6" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "product": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "product_id": "openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-operator-bundle\u0026tag=v1.4.4-6" } } }, { "category": "product_version", "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "product": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "product_identification_helper": { "purl": "pkg:oci/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.4.4-6" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64" }, "product_reference": "openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" }, "product_reference": "openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64" }, "product_reference": "openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64" }, "product_reference": "openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64" }, "product_reference": "openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64 as a component of Red Hat OpenShift GitOps 1.4", "product_id": "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" }, "product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64", "relates_to_product_reference": "8Base-GitOps-1.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1025", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064682" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in ArgoCD. This flaw allows a malicious user who has push access to an application\u0027s source git or Helm repository, or sync and override access, to perform actions they are not authorized to do. \r\n\r\nFor example, if the attacker has `update` or `delete` access, they can modify or delete any resource on the destination cluster and escalate ArgoCD privileges to the admin level. If the attacker has `get` access, they can view and list actions for any resource on the destination cluster except secrets and view the logs of any pods on the destination cluster. If the attacker has action/{some action or *} access on the application, they can run an action for any resource that supports the allowed action on the application\u0027s destination cluster.", "title": "Vulnerability description" }, { "category": "summary", "text": "Openshift-Gitops: Improper access control allows admin privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ], "known_not_affected": [ "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1025" }, { "category": "external", "summary": "RHBZ#2064682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1025", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1025" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:18:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Openshift-Gitops: Improper access control allows admin privilege escalation" }, { "cve": "CVE-2022-24730", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062751" } ], "notes": [ { "category": "description", "text": "A flaw was found in ArgoCD. This flaw allows an attacker with read-only repository access to leak files from the repo server that the attacker should not have access to. An attacker can send a crafted request to retrieve file contents. This issue results in the disclosure of sensitive information to an unauthorized actor and compromises data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal and improper access control allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ], "known_not_affected": [ "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24730" }, { "category": "external", "summary": "RHBZ#2062751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24730", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24730" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24730" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:18:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal and improper access control allows leaking out-of-bound files" }, { "cve": "CVE-2022-24731", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2022-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062755" } ], "notes": [ { "category": "description", "text": "A path traversal flaw was found in ArgoCD. This flaw allows an attacker who has been granted create or update access to applications to leak the contents of any text file on the repo-server by crafting a malicious Helm chart. Such text files could include sensitive information that the attacker should not have access to, compromising data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "argocd: path traversal allows leaking out-of-bound files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ], "known_not_affected": [ "8Base-GitOps-1.4:openshift-gitops-1/applicationset-rhel8@sha256:c966963a6444c314ae25f344ccc3f1cf95d8eed3ec51731e17d51686c92a6faa_amd64", "8Base-GitOps-1.4:openshift-gitops-1/dex-rhel8@sha256:c731e153854c9ecf632e6a5eece55a1a9784d6f207dcab8da68af3ecdc636dc6_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-operator-bundle@sha256:b745066a11639980442b4ed17067ba9463cf6bd8811e01941de22df8fee0ccac_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8-operator@sha256:8d97f916c4e10491db8387ce94c377d130afab47dcb3785cec394ffb5725e6f5_amd64", "8Base-GitOps-1.4:openshift-gitops-1/gitops-rhel8@sha256:82c195a46b3f617e50f128a9726d0caab289b2a29bf274d283a2a50bc3f4c0f1_amd64", "8Base-GitOps-1.4:openshift-gitops-1/kam-delivery-rhel8@sha256:e70509ea9ebe8f5b5a267059ec5cef8d143a7c511ea1c65e2aaab68e38f9c3f1_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24731" }, { "category": "external", "summary": "RHBZ#2062755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24731" } ], "release_date": "2022-03-22T17:15:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T21:18:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-GitOps-1.4:openshift-gitops-1/argocd-rhel8@sha256:28dfb790f234e8819c7641971956a08e8c7167d6fe8d61594bb952eb5ca84ab1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "argocd: path traversal allows leaking out-of-bound files" } ] }
gsd-2022-24730
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-24730", "description": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.3.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD\u0027s repo-server. A malicious Argo CD user who has been granted `get` access for a repository containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from other Applications\u0027 source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The patches prevent path traversal and limit access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges and are requesting details for a `repo_url` that has already been used for the given Application. There are currently no known workarounds.", "id": "GSD-2022-24730", "references": [ "https://access.redhat.com/errata/RHSA-2022:1039", "https://access.redhat.com/errata/RHSA-2022:1040", "https://access.redhat.com/errata/RHSA-2022:1041", "https://access.redhat.com/errata/RHSA-2022:1042" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-24730" ], "details": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.3.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD\u0027s repo-server. A malicious Argo CD user who has been granted `get` access for a repository containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from other Applications\u0027 source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The patches prevent path traversal and limit access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges and are requesting details for a `repo_url` that has already been used for the given Application. There are currently no known workarounds.", "id": "GSD-2022-24730", "modified": "2023-12-13T01:19:43.292880Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24730", "STATE": "PUBLIC", "TITLE": "Path traversal and improper access control allows leaking out-of-bound files from Argo CD repo-server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "argo-cd", "version": { "version_data": [ { "version_value": "\u003e= 1.3.0, \u003c 2.1.11" }, { "version_value": "\u003e= 2.2.0, \u003c 2.2.6" }, { "version_value": "\u003e= 2.3.0-rc1, \u003c 2.3.0" } ] } } ] }, "vendor_name": "argoproj" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.3.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD\u0027s repo-server. A malicious Argo CD user who has been granted `get` access for a repository containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from other Applications\u0027 source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The patches prevent path traversal and limit access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges and are requesting details for a `repo_url` that has already been used for the given Application. There are currently no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-284: Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v", "refsource": "CONFIRM", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v" } ] }, "source": { "advisory": "GHSA-r9cr-hvjj-496v", "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=v1.3.0 \u003cv2.1.11 || \u003e=v2.2.0 \u003cv2.2.6 || \u003e=v2.3.0-rc1 \u003cv2.3.0", "affected_versions": "All versions starting from 1.3.0 before 2.1.11, all versions starting from 2.2.0 before 2.2.6, all versions starting from 2.3.0-rc1 before 2.3.0", "cwe_ids": [ "CWE-1035", "CWE-22", "CWE-284", "CWE-352", "CWE-937" ], "date": "2022-03-29", "description": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.3.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD\u0027s repo-server. A malicious Argo CD user who has been granted `get` access for a repository containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from other Applications\u0027 source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The patches prevent path traversal and limit access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges and are requesting details for a `repo_url` that has already been used for the given Application. There are currently no known workarounds.", "fixed_versions": [ "v2.1.11", "v2.2.6", "v2.3.0" ], "identifier": "CVE-2022-24730", "identifiers": [ "GHSA-r9cr-hvjj-496v", "CVE-2022-24730" ], "not_impacted": "All versions before 1.3.0, all versions starting from 2.1.11 before 2.2.0, all versions starting from 2.2.6 before 2.3.0-rc1, all versions starting from 2.3.0", "package_slug": "go/github.com/argoproj/argo-cd", "pubdate": "2022-03-24", "solution": "Upgrade to versions 2.1.11, 2.2.6, 2.3.0 or above.", "title": "Improper Access Control", "urls": [ "https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v", "https://nvd.nist.gov/vuln/detail/CVE-2022-24730", "https://github.com/advisories/GHSA-r9cr-hvjj-496v" ], "uuid": "ea3482fb-a919-4d1f-96b5-6d27a796187d", "versions": [ { "commit": { "sha": "9f8608c9fcb2a1d8dcc06eeadd57e5c0334c5800", "tags": [ "v1.3.0" ], "timestamp": "20191113010324" }, "number": "v1.3.0" }, { "commit": { "sha": "6da92a8e8103ce4145bb0fe2b7e952be79c9ff0a", "tags": [ "v2.2.0" ], "timestamp": "20211214180104" }, "number": "v2.2.0" }, { "commit": { "sha": "7d7eed49329197207e5b86420780696bfc8c9ca9", "tags": [ "v2.3.0-rc1" ], "timestamp": "20220130214254" }, "number": "v2.3.0-rc1" }, { "commit": { "sha": "e25d3b54354dc529a11a1ccbb19f6338aa027525", "tags": [ "v2.1.11" ], "timestamp": "20220306053033" }, "number": "v2.1.11" }, { "commit": { "sha": "2e550c3f0723daf94df7343b7c40f459aafd6fff", "tags": [ "v2.2.6" ], "timestamp": "20220306055051" }, "number": "v2.2.6" }, { "commit": { "sha": "fe427802293b090f43f91f5839393174df6c3b3a", "tags": [ "v2.3.0" ], "timestamp": "20220306061859" }, "number": "v2.3.0" } ] } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.2.6", "versionStartIncluding": "2.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1.11", "versionStartIncluding": "1.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:argo-cd:2.3.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:argo-cd:2.3.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:argo-cd:2.3.0:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:argo-cd:2.3.0:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24730" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.3.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD\u0027s repo-server. A malicious Argo CD user who has been granted `get` access for a repository containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from other Applications\u0027 source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The patches prevent path traversal and limit access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges and are requesting details for a `repo_url` that has already been used for the given Application. There are currently no known workarounds." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-22" }, { "lang": "en", "value": "CWE-863" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2023-06-23T19:16Z", "publishedDate": "2022-03-23T21:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.