CVE-2022-24731 in Linux Foundation and Argoproj Products
Published on March 23, 2022
Path traversal allows leaking out-of-bound files from Argo CD repo-server
Vulnerability Analysis
CVE-2022-24731 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Types
What is a Directory traversal Vulnerability?
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CVE-2022-24731 has been classified to as a Directory traversal vulnerability or weakness.
What is an Authorization Vulnerability?
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CVE-2022-24731 has been classified to as an Authorization vulnerability or weakness.
Products Associated with CVE-2022-24731
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-24731 are published in these products:
Affected Versions
argoproj argo-cd:- Version >= 1.5.0, < 2.1.11 is affected.
- Version >= 2.2.0, < 2.2.6 is affected.
- Version >= 2.3.0-rc1, < 2.3.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.