Vulnerability identifier: #VU79955
Vulnerability risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-613
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Argo CD
Web applications /
Modules and components for CMS
Vendor: Argo
Description
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient session expiration issue. A remote non-authenticated attacker can obtain or guess session token and send any websocket messages even if the token has already expired.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Argo CD: 2.6.0 - 2.6.13, 2.7.0 - 2.7.12, 2.8.0
External links
https://github.com/argoproj/argo-cd/security/advisories/GHSA-c8xw-vjgf-94hr
https://github.com/argoproj/argo-cd/commit/e047efa8f9518c54d00d2e4493b64bc4dba98478
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.