Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU72074
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-25163
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The
error message is visible when a user attempts to create or update an
Application via the Argo CD API (and therefor the UI or CLI). The user
must have applications, create
or applications, update
RBAC access to reach the code which may produce the error. A remote user can gain unauthorized access to sensitive information.
Install updates from vendor's website.
Vulnerable software versionsArgo CD: 2.6.0
CPE2.3 External linkshttps://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.