Information Exposure Affecting github.com/argoproj/argo-cd/v2/util/db package, versions >=2.2.0 <2.6.15>=2.7.0 <2.7.14>=2.8.0 <2.8.3


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.66% (70th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMARGOPROJARGOCDV2UTILDB-5888346
  • published8 Sept 2023
  • disclosed5 Sept 2023
  • creditalexmt

Introduced: 5 Sep 2023

CVE-2023-40029  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade github.com/argoproj/argo-cd/v2/util/db to version 2.6.15, 2.7.14, 2.8.3 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure such that Argo CD Cluster secrets might be managed declaratively using Argo CD / kubectl apply. As a result, the full secret body is stored in kubectl.kubernetes.io/last-applied-configuration annotation.

Note:

In order to view the cluster annotations via the Argo CD API, the user must have clusters, get RBAC access. In many cases, cluster secrets do not contain any actually-secret information. But sometimes, as in bearer-token auth, the contents might be very sensitive.

Workaround

Users can Update/Deploy cluster secret with server-side-apply flag which does not use or rely on kubectl.kubernetes.io/last-applied-configuration annotation. Annotation for existing secrets will require manual removal.

CVSS Base Scores

version 3.1