CWE
863
Advisory Published
Updated

CVE-2023-22482: JWT audience claim is not verified

First published: Wed Jan 25 2023(Updated: )

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Versions of Argo CD starting with v1.8.2 and prior to 2.3.13, 2.4.19, 2.5.6, and 2.6.0-rc-3 are vulnerable to an improper authorization bug causing the API to accept certain invalid tokens. OIDC providers include an `aud` (audience) claim in signed tokens. The value of that claim specifies the intended audience(s) of the token (i.e. the service or services which are meant to accept the token). Argo CD _does_ validate that the token was signed by Argo CD's configured OIDC provider. But Argo CD _does not_ validate the audience claim, so it will accept tokens that are not intended for Argo CD. If Argo CD's configured OIDC provider also serves other audiences (for example, a file storage service), then Argo CD will accept a token intended for one of those other audiences. Argo CD will grant the user privileges based on the token's `groups` claim, even though those groups were not intended to be used by Argo CD. This bug also increases the impact of a stolen token. If an attacker steals a valid token for a different audience, they can use it to access Argo CD. A patch for this vulnerability has been released in versions 2.6.0-rc3, 2.5.6, 2.4.19, and 2.3.13. There are no workarounds.

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Linuxfoundation Argo-cd>=1.8.2<2.3.14
Linuxfoundation Argo-cd>=2.4.0<2.4.20
Linuxfoundation Argo-cd>=2.5.0<2.5.8
Linuxfoundation Argo-cd=2.6.0-rc1
Linuxfoundation Argo-cd=2.6.0-rc2
Linuxfoundation Argo-cd=2.6.0-rc3
Linuxfoundation Argo-cd=2.6.0-rc4
Argoproj Argo Cd>=1.8.2<2.3.14
Argoproj Argo Cd>=2.4.0<2.4.20
Argoproj Argo Cd>=2.5.0<2.5.8
Argoproj Argo Cd=2.6.0-rc1
Argoproj Argo Cd=2.6.0-rc2
Argoproj Argo Cd=2.6.0-rc3
Argoproj Argo Cd=2.6.0-rc4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-22482?

    CVE-2023-22482 is a vulnerability in Argo CD that allows the API to accept certain invalid tokens.

  • Which versions of Argo CD are affected by CVE-2023-22482?

    Versions of Argo CD starting with v1.8.2 and prior to 2.3.14, 2.4.20, 2.5.8, 2.6.0-rc1, 2.6.0-rc2, and 2.6.0-rc3 are affected by CVE-2023-22482.

  • What is the severity of CVE-2023-22482?

    CVE-2023-22482 has a severity rating of 8.8, which is considered critical.

  • How can I fix CVE-2023-22482 in Argo CD?

    To fix CVE-2023-22482, you should update Argo CD to version 2.3.14, 2.4.20, 2.5.8, 2.6.0-rc1, 2.6.0-rc2, or 2.6.0-rc3.

  • Where can I find more information about CVE-2023-22482?

    More information about CVE-2023-22482 can be found at the following link: [https://github.com/argoproj/argo-cd/security/advisories/GHSA-q9hr-j4rf-8fjc]

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203