Hide Forgot
A critical vulnerability has been discovered in Argo CD which would allow unauthenticated users to impersonate any Argo CD user or role, including the admin user, by sending a specifically crafted JSON Web Token (JWT) along with the request. In order for this vulnerability to be exploited, anonymous access to the Argo CD instance must have been enabled.
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.3 Via RHSA-2022:4671 https://access.redhat.com/errata/RHSA-2022:4671
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.5 Via RHSA-2022:4690 https://access.redhat.com/errata/RHSA-2022:4690
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.3 Via RHSA-2022:4691 https://access.redhat.com/errata/RHSA-2022:4691
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.4 Via RHSA-2022:4692 https://access.redhat.com/errata/RHSA-2022:4692
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-29165