CVE-2024-41666
CVSS V2 None
CVSS V3 None
Description
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD has a Web-based terminal that allows users to get a shell inside a running pod, just as they would with kubectl exec. Starting in version 2.6.0, when the administrator enables this function and grants permission to the user `p, role:myrole, exec, create, */*, allow`, even if the user revokes this permission, the user can still perform operations in the container, as long as the user keeps the terminal view open for a long time. Although the token expiration and revocation of the user are fixed, however, the fix does not address the situation of revocation of only user `p, role:myrole, exec, create, */*, allow` permissions, which may still lead to the leakage of sensitive information. A patch for this vulnerability has been released in Argo CD versions 2.11.7, 2.10.16, and 2.9.21.
Overview
- CVE ID
- CVE-2024-41666
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-07-24T17:16:37.730Z
- Last Modified Date
- 2024-07-24T18:07:47.936Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/argoproj/argo-cd/security/advisories/GHSA-v8wx-v5jq-qhhw | x_refsource_CONFIRM |
https://github.com/argoproj/argo-cd/commit/05edb2a9ca48f0f10608c1b49fbb0cf7164f6476 | x_refsource_MISC |
https://github.com/argoproj/argo-cd/commit/e96f32d233504101ddac028a5bf8117433d333d6 | x_refsource_MISC |
https://github.com/argoproj/argo-cd/commit/ef535230d8bd8ad7b18aab1ea1063e9751d348c4 | x_refsource_MISC |
https://drive.google.com/file/d/1Fynj5Sho8Lf8CETqsNXZyPKlTDdmgJuN/view?usp=sharing | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-41666 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41666 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-07-25 13:05:31 | Added to TrackCVE |