The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsA fix was pushed into the master
branch but not yet published.
Affected versions of this package are vulnerable to Authorization Bypass which allows a malicious Argo CD user to deploy Applications outside the configured allowed namespaces.
Note:
This bug only applies to users who have explicitly enabled the "apps-in-any-namespace" feature by setting application.namespaces
in the argocd-cmd-params-cm ConfigMap or otherwise setting the --application-namespaces
flags on the Application controller and API server components.
The vulnerability is limited to Argo CD instances where sharding is enabled by increasing the replicas
count for the Application controller.
The AppProjects' sourceNamespaces
field acts as a secondary check against this exploit. To cause reconciliation of an Application in an out-of-bounds namespace, an AppProject must be available which permits Applications in the out-of-bounds namespace.
Users that are not able to update to a fixed version are advised to run only one replica of the Application controller. It will prevent the exploitation of this issue.
Also, making sure all AppProjects' sourceNamespaces
are restricted within the confines of the configured Application namespaces will also prevent exploitation of this bug.