Bug 2292313 (CVE-2024-37152) - CVE-2024-37152 argo-cd: Unauthenticated information disclosure in /api/v1/settings endpoint
Summary: CVE-2024-37152 argo-cd: Unauthenticated information disclosure in /api/v1/set...
Keywords:
Status: NEW
Alias: CVE-2024-37152
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2292315
Blocks: 2292314
TreeView+ depends on / blocked
 
Reported: 2024-06-14 03:02 UTC by Pedro Sampaio
Modified: 2025-04-18 08:27 UTC (History)
4 users (show)

Fixed In Version: argo-cd 2.11.3, argo-cd 2.10.12, argo-cd 2.9.17
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2024-06-14 03:02:21 UTC
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The vulnerability allows unauthorized access to the sensitive settings exposed by  /api/v1/settings endpoint without authentication. All sensitive settings are hidden except passwordPattern. This vulnerability is fixed in 2.11.3, 2.10.12, and 2.9.17.

References:

https://github.com/argoproj/argo-cd/commit/256d90178b11b04bc8174d08d7b663a2a7b1771b
https://github.com/argoproj/argo-cd/security/advisories/GHSA-87p9-x75h-p4j2


Note You need to log in before you can comment on or make changes to this bug.