First published: Tue Feb 07 2023(Updated: )
A flaw was found in ArgoCD. An improper authorization bug may allow an attacker to update at least one cluster secret, enabling them to change any other cluster secret. The attacker must know the URL for the targeted cluster and additionally it should be authenticated within the ArgoCD API server with enough privileges to update at least one cluster. A successful attack may lead to privilege escalations or denial of service.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Argo-cd | >=2.3.0<2.3.17 | |
Linuxfoundation Argo-cd | >=2.4.0<2.4.23 | |
Linuxfoundation Argo-cd | >=2.5.0<2.5.11 | |
Linuxfoundation Argo-cd | >=2.6.0<2.6.2 | |
Argoproj Argo Cd | >=2.3.0<2.3.17 | |
Argoproj Argo Cd | >=2.4.0<2.4.23 | |
Argoproj Argo Cd | >=2.5.0<2.5.11 | |
Argoproj Argo Cd | >=2.6.0<2.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2023-23947.
The severity of CVE-2023-23947 is critical with a score of 9.1.
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes.
Argo CD versions 2.3.0-rc1 to 2.3.17, 2.4.0 to 2.4.23, 2.5.0 to 2.5.11, and 2.6.0 to 2.6.2 are affected by CVE-2023-23947.
An attacker with the ability to update at least one cluster secret can exploit CVE-2023-23947.
Yes, here are some references for CVE-2023-23947: [Red Hat - RHSA-2023:0802](https://access.redhat.com/errata/RHSA-2023:0802), [Red Hat - RHSA-2023:0803](https://access.redhat.com/errata/RHSA-2023:0803), [Red Hat - RHSA-2023:0804](https://access.redhat.com/errata/RHSA-2023:0804).