Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
The Argo CD web terminal session does not handle the revocation of user permissions properly.
Vulnerability Description
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD has a Web-based terminal that allows users to get a shell inside a running pod, just as they would with kubectl exec. Starting in version 2.6.0, when the administrator enables this function and grants permission to the user `p, role:myrole, exec, create, */*, allow`, even if the user revokes this permission, the user can still perform operations in the container, as long as the user keeps the terminal view open for a long time. Although the token expiration and revocation of the user are fixed, however, the fix does not address the situation of revocation of only user `p, role:myrole, exec, create, */*, allow` permissions, which may still lead to the leakage of sensitive information. A patch for this vulnerability has been released in Argo CD versions 2.11.7, 2.10.16, and 2.9.21.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
特权管理不恰当
Vulnerability Title
Argo CD 安全漏洞
Vulnerability Description
Argo CD是Argo Project开源的一个用于Kubernetes的声明性GitOps连续交付工具。 Argo CD 2.6.0至2.11.3版本存在安全漏洞,该漏洞源于Web终端允许用户在运行中的Pod内部获得一个shell,当管理员启用了这个功能并授予用户特定权限,即使用户撤销了这个权限,只要用户长时间保持终端视图打开,他们仍然可以在容器内执行操作,可能导致敏感信息泄露。
CVSS Information
N/A
Vulnerability Type
N/A