Information Exposure Affecting github.com/argoproj/argo-cd/v2/server package, versions >=0.5.0 <2.4.28 >=2.6.0 <2.6.7 >=2.5.0 <2.5.16
Threat Intelligence
EPSS
0.07% (34th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDV2SERVER-3370267
- published 24 Mar 2023
- disclosed 23 Mar 2023
- credit bean.zhang
Introduced: 23 Mar 2023
CVE-2022-41354 Open this link in a new tabHow to fix?
Upgrade github.com/argoproj/argo-cd/v2/server
to version 2.4.28, 2.6.7, 2.5.16 or higher.
Overview
Affected versions of this package are vulnerable to Information Exposure due to allowing authenticated but unauthorized users to enumerate Application names by inspecting API error messages. An attacker could use the discovered application names as the starting point of another attack. For example, the attacker might use their knowledge of an application name to convince an administrator to grant higher privileges (social engineering).
References
CVSS Scores
version 3.1