The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/argoproj/argo-cd/v2/util/session
to version 2.3.14, 2.4.20, 2.5.8, 2.6.0-rc5 or higher.
github.com/argoproj/argo-cd/v2/util/session is a declarative, GitOps continuous delivery tool for Kubernetes.
Affected versions of this package are vulnerable to Improper Restriction of Security Token Assignment causing the API to accept certain invalid tokens.
OIDC providers include an aud
(audience) claim in signed tokens. The value of that claim specifies the intended audience(s) of the token (i.e. the service or services which are meant to accept the token). Argo CD does validate that the token was signed by Argo CD's configured OIDC provider. But Argo CD does not validate the audience claim, so it will accept tokens that are not intended for Argo CD.
If Argo CD's configured OIDC provider also serves other audiences (for example, a file storage service), then Argo CD will accept a token intended for one of those other audiences. Argo CD will grant the user privileges based on the token's groups
claim, even though those groups were not intended to be used by Argo CD.
This also increases the blast radius of a stolen token. If an attacker steals a valid token for a different audience, they can use it to access Argo CD.