Information Exposure Affecting github.com/argoproj/argo-cd/v2/util/exec package, versions >=1.8.0 <1.8.7<1.7.14


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMARGOPROJARGOCDV2UTILEXEC-1296567
  • published25 May 2021
  • disclosed21 May 2021
  • creditUnknown

Introduced: 21 May 2021

CVE NOT AVAILABLE CWE-200  (opens in a new tab)

How to fix?

Upgrade github.com/argoproj/argo-cd/v2/util/exec to version 1.8.7, 1.7.14 or higher.

Overview

github.com/argoproj/argo-cd/v2/util/exec is an Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes.

Affected versions of this package are vulnerable to Information Exposure. When Argo CD was connected to a Helm OCI repository with authentication enabled, the credentials used for accessing the remote repository were logged. Anyone with access to the pod logs - either via access with appropriate permissions to the Kubernetes control plane or a third party log management system where the logs from Argo CD were aggregated - could have potentially obtained the credentials to the Helm OCI repository.

References

CVSS Base Scores

version 3.1