Hide Forgot
All unpatched versions of Argo CD starting with v1.3.0 are vulnerable to a symlink following bug allowing a malicious user with repository write access to leak-sensitive YAML files from Argo CD's repo-server. A malicious Argo CD user with write access for a repository (or maybe) used in a Helm-type Application may commit a symlink pointing to an out-of-bounds file. If the target file is a valid YAML file, the attacker can read the contents of that file. Sensitive files which could be leaked include manifest files from other Applications' source repositories (potentially decrypted files, if you are using a decryption plugin) or any YAML-formatted secrets which have been mounted as files on the repo-server.
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.5 Via RHSA-2022:5152 https://access.redhat.com/errata/RHSA-2022:5152
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.4 Via RHSA-2022:5153 https://access.redhat.com/errata/RHSA-2022:5153
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.3 Via RHSA-2022:5192 https://access.redhat.com/errata/RHSA-2022:5192
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.3 Via RHSA-2022:5187 https://access.redhat.com/errata/RHSA-2022:5187
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-31036