Directory Traversal Vulnerability in Argo CD by Argo Project
CVE-2022-24348
Key Information:
Badges
Summary
A directory traversal vulnerability in Argo CD enables attackers to exploit improper access controls, allowing them to traverse directories and potentially access sensitive information, such as credentials stored in YAML files. This flaw arises from an issue in the helmTemplate function within repository.go, affecting installations of Argo CD that are prior to versions 2.1.9 or 2.2.4. If successfully exploited, this vulnerability could lead to data breaches, posing significant risks to deployed applications and underlying infrastructure.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved