Hide Forgot
All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to a cross-site scripting (XSS) bug allowing a malicious user to inject a javascript link in the UI. When clicked by a victim user, the script will execute with the victim's permissions (up to and including admin). The script would be capable of doing anything which is possible in the UI or via the API, such as creating, modifying, and deleting Kubernetes resources.
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.5 Via RHSA-2022:5152 https://access.redhat.com/errata/RHSA-2022:5152
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.4 Via RHSA-2022:5153 https://access.redhat.com/errata/RHSA-2022:5153
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.3 Via RHSA-2022:5192 https://access.redhat.com/errata/RHSA-2022:5192
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.3 Via RHSA-2022:5187 https://access.redhat.com/errata/RHSA-2022:5187
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-31035