blob: bc7f9a6b66d0b22cd8bfbd944f5591e239b93645 [file] [log] [blame]
id: GO-2023-1548
modules:
- module: github.com/argoproj/argo-cd/v2
versions:
- introduced: 2.6.0-rc1
- fixed: 2.6.1
vulnerable_at: 2.6.0
packages:
- package: github.com/argoproj/argo-cd/v2/util/argo
symbols:
- validateRepo
derived_symbols:
- ValidateRepo
summary: Repository access credential leak in github.com/argoproj/argo-cd/v2
description: |-
Argo CD has an output sanitization bug which leaks repository access credentials
in error messages.
These error messages are visible to the user, and they are logged. The error
message is visible when a user attempts to create or update an Application via
the Argo CD API (and therefor the UI or CLI).
The user must have "applications, create" or "applications, update" RBAC access
to reach the code which may produce the error. The user is not guaranteed to be
able to trigger the error message. They may attempt to spam the API with
requests to trigger a rate limit error from the upstream repository.
If the user has "repositories, update" access, they may edit an existing
repository to introduce a URL typo or otherwise force an error message.
cves:
- CVE-2023-25163
ghsas:
- GHSA-mv6w-j4xc-qpfw
credits:
- James Callahan
references:
- advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw
- report: https://github.com/argoproj/argo-cd/issues/12309
- fix: https://github.com/argoproj/argo-cd/pull/12320
review_status: REVIEWED