A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Argo_cd | Argoproj | * | 1.1.1 (excluding) |
Red Hat OpenShift GitOps 1.1 | RedHat | openshift-gitops-1/applicationset-rhel8:v1.1.1-1 | * |
Red Hat OpenShift GitOps 1.1 | RedHat | openshift-gitops-1/argocd-rhel8:v1.1.1-1 | * |
Red Hat OpenShift GitOps 1.1 | RedHat | openshift-gitops-1/gitops-operator-bundle:v1.1.1-1 | * |
Red Hat OpenShift GitOps 1.1 | RedHat | openshift-gitops-1/gitops-rhel8:v1.1.1-1 | * |
Red Hat OpenShift GitOps 1.1 | RedHat | openshift-gitops-1/gitops-rhel8-operator:v1.1.1-1 | * |
Red Hat OpenShift GitOps 1.1 | RedHat | openshift-gitops-1/kam-delivery-rhel8:v1.1.1-1 | * |