Argo CD does not scrub secret values from patch errors
Package
Affected versions
>= 2.13.0, < 2.13.4
>= 2.12.0, < 2.12.10
< 2.11.13
Patched versions
2.13.4
2.12.10
2.11.13
Description
Published by the National Vulnerability Database
Jan 30, 2025
Published to the GitHub Advisory Database
Jan 30, 2025
Reviewed
Jan 30, 2025
Last updated
Jan 30, 2025
Impact
A vulnerability was discovered in Argo CD that exposed secret values in error messages and the diff view when an invalid Kubernetes Secret resource was synced from a repository.
The vulnerability assumes the user has write access to the repository and can exploit it, either intentionally or unintentionally, by committing an invalid Secret to repository and triggering a Sync. Once exploited, any user with read access to Argo CD can view the exposed secret data.
Patches
A patch for this vulnerability is available in the following Argo CD versions:
Workarounds
There is no workaround other than upgrading.
References
Fixed with commit argoproj/argo-cd@6f5537b & argoproj/gitops-engine@7e21b91
References