2024-10-13 02:03:17 +00:00

76 lines
3.9 KiB
JSON

{
"id": "CVE-2024-41666",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-24T18:15:05.090",
"lastModified": "2024-07-25T12:36:39.947",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD has a Web-based terminal that allows users to get a shell inside a running pod, just as they would with kubectl exec. Starting in version 2.6.0, when the administrator enables this function and grants permission to the user `p, role:myrole, exec, create, */*, allow`, even if the user revokes this permission, the user can still perform operations in the container, as long as the user keeps the terminal view open for a long time. Although the token expiration and revocation of the user are fixed, however, the fix does not address the situation of revocation of only user `p, role:myrole, exec, create, */*, allow` permissions, which may still lead to the leakage of sensitive information. A patch for this vulnerability has been released in Argo CD versions 2.11.7, 2.10.16, and 2.9.21."
},
{
"lang": "es",
"value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Argo CD tiene una terminal basada en web que permite a los usuarios obtener un shell dentro de un pod en ejecuci\u00f3n, tal como lo har\u00edan con kubectl exec. A partir de la versi\u00f3n 2.6.0, cuando el administrador habilita esta funci\u00f3n y otorga permiso al usuario `p, role:myrole, exec, create, */*, enable`, incluso si el usuario revoca este permiso, el usuario a\u00fan puede realizar operaciones en el contenedor, siempre y cuando el usuario mantenga abierta la vista del terminal durante mucho tiempo. Aunque la caducidad del token y la revocaci\u00f3n del usuario est\u00e1n arregladas, la soluci\u00f3n no aborda la situaci\u00f3n de revocaci\u00f3n de permisos \u00fanicamente del usuario `p, role:myrole, exec, create, */*, enable`, lo que a\u00fan puede conducir a la filtraci\u00f3n de informaci\u00f3n sensible. Se lanz\u00f3 un parche para esta vulnerabilidad en las versiones 2.11.7, 2.10.16 y 2.9.21 de Argo CD."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1Fynj5Sho8Lf8CETqsNXZyPKlTDdmgJuN/view?usp=sharing",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/argoproj/argo-cd/commit/05edb2a9ca48f0f10608c1b49fbb0cf7164f6476",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/argoproj/argo-cd/commit/e96f32d233504101ddac028a5bf8117433d333d6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/argoproj/argo-cd/commit/ef535230d8bd8ad7b18aab1ea1063e9751d348c4",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-v8wx-v5jq-qhhw",
"source": "security-advisories@github.com"
}
]
}