CVE-2024-40634 Affecting argo-cd-2.11 package, versions <2.11.6-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-WOLFILATEST-ARGOCD211-7547996
  • published23 Jul 2024
  • disclosed22 Jul 2024

Introduced: 22 Jul 2024

CVE-2024-40634  (opens in a new tab)

How to fix?

Upgrade Wolfi argo-cd-2.11 to version 2.11.6-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream argo-cd-2.11 package and not the argo-cd-2.11 package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. This report details a security vulnerability in Argo CD, where an unauthenticated attacker can send a specially crafted large JSON payload to the /api/webhook endpoint, causing excessive memory allocation that leads to service disruption by triggering an Out Of Memory (OOM) kill. The issue poses a high risk to the availability of Argo CD deployments. This vulnerability is fixed in 2.11.6, 2.10.15, and 2.9.20.