First published: Wed Mar 03 2021(Updated: )
### Impact When using SSO with the Argo CD CLI, a malicious SSO provider could have sent specially crafted error message that would result in XSS on the client by means of executing arbitrary JavaScript code. We believe the exploitation of this vulnerability is only be possible when Argo CD is connected to a compromised/malicious SSO provider. ### Patches A patch for this vulnerability is available with the v1.8.7 and v1.7.14 releases of Argo CD. ### Workarounds * Do not use SSO with the CLI when you don't trust your SSO provider If you have any questions or comments about this advisory: * Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) * Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel `#argo-cd` ### Credits The issue was found during static code scanning with CodeQL and fixed by the Argo CD team. While we believed that a rogue SSO provider would pose a severe threat by itself, we fixed it like a regular bug. The Argo CD team would like to thank Adam Gold of Snyk (https://snyk.io) for stepping up and classifying this correctly as a security issue and for his help in determining its severity. Also, Snyk kindly reserved and provided the CVE for this vulnerability. We fully agree with Adam that this bug is a security vulnerability and justifies publishing a SA, to provide our community and users full transparancy.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Argo Continuous Delivery | <1.7.13 | |
Linuxfoundation Argo Continuous Delivery | >=1.8.0<1.8.6 | |
Argoproj Argo Cd | <1.7.13 | |
Argoproj Argo Cd | >=1.8.0<1.8.6 | |
go/github.com/argoproj/argo-cd/v2 | >=1.8.0<1.8.6 | 1.8.6 |
go/github.com/argoproj/argo-cd/v2 | <1.7.13 | 1.7.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23347 is a vulnerability in the package github.com/argoproj/argo-cd/cmd version before 1.7.13 and from 1.8.0 to 1.8.6.
The severity of CVE-2021-23347 is medium with a CVSS score of 4.8.
Linuxfoundation Argo Continuous Delivery is affected by CVE-2021-23347 if the package version is before 1.7.13 or between 1.8.0 to 1.8.6.
Cross-site Scripting (XSS) is a type of web vulnerability where attackers inject malicious scripts into web pages viewed by other users.
Yes, you can refer to the following links for more information: [Reference 1](https://github.com/argoproj/argo-cd/pull/5563), [Reference 2](https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDCMD-1078291).