All versions of ArgoCD starting from v2.4 have a bug where the ArgoCD repo-server component is vulnerable to a Denial-of-Service attack vector. Specifically, the said component extracts a user-controlled tar.gz file without validating the size of its inner files. As a result, a malicious, low-privileged user can send a malicious tar.gz file that exploits this vulnerability to the repo-server, thereby harming the system's functionality and availability. Additionally, the repo-server is susceptible to another vulnerability due to the fact that it does not check the extracted file permissions before attempting to delete them. Consequently, an attacker can craft a malicious tar.gz archive in a way that prevents the deletion of its inner files when the manifest generation process is completed.
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.9 Via RHSA-2023:5029 https://access.redhat.com/errata/RHSA-2023:5029
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.8 Via RHSA-2023:5030 https://access.redhat.com/errata/RHSA-2023:5030