Information Exposure Affecting github.com/argoproj/argo-cd/v2/server package, versions >=0.5.0 <2.4.28 >=2.6.0 <2.6.7 >=2.5.0 <2.5.16


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.07% (34th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDV2SERVER-3370267
  • published 24 Mar 2023
  • disclosed 23 Mar 2023
  • credit bean.zhang

How to fix?

Upgrade github.com/argoproj/argo-cd/v2/server to version 2.4.28, 2.6.7, 2.5.16 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure due to allowing authenticated but unauthorized users to enumerate Application names by inspecting API error messages. An attacker could use the discovered application names as the starting point of another attack. For example, the attacker might use their knowledge of an application name to convince an administrator to grant higher privileges (social engineering).

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.3 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    None
  • Availability (A)
    None
Expand this section

NVD

4.3 medium