Argo CD 2.6.0 Web Term. Sess. Leak Expired Token WebSocket Access
CVE-2023-40025 Published on August 23, 2023
Argo CD web terminal session doesn't expire
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting from version 2.6.0 have a bug where open web terminal sessions do not expire. This bug allows users to send any websocket messages even if the token has already expired. The most straightforward scenario is when a user opens the terminal view and leaves it open for an extended period. This allows the user to view sensitive information even when they should have been logged out already. A patch for this vulnerability has been released in the following Argo CD versions: 2.6.14, 2.7.12 and 2.8.1.
Vulnerability Analysis
CVE-2023-40025 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.
Weakness Type
Insufficient Session Expiration
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Products Associated with CVE-2023-40025
stack.watch emails you whenever new vulnerabilities are published in Linux Foundation Argo Cd or Argoproj Argo Cd. Just hit a watch button to start following.
Affected Versions
argoproj argo-cd:- Version >= 2.6.0, < 2.6.14 is affected.
- Version >= 2.7.0, < 2.7.12 is affected.
- Version = 2.8.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.