-
Vulnerability
-
Resolution: Done
-
Major
-
1.16.0
-
False
-
-
False
-
-
-
-
Red Hat
-
CVE-2024-13484
-
8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
-
CWE-668
-
openshift-gitops-operator-container
-
openshift-gitops-operator-container
-
False
-
GitOps Crimson Sprint 16
-
Moderate
Security Tracking Issue
Do not make this issue public.
Flaw:
Namespace Isolation Break
https://bugzilla.redhat.com/show_bug.cgi?id=2269376
Currently argocd applies the label openshift.io/cluster-monitoring to all namespaces that deploy a ArgoCD CR instance. This then allows the namespace
to create a rogue PrometheusRule that can then have adverse effects on the platform monitoring stack. As the label is applied the rule is rolled out
cluster wide.
This gives anyone who has argocd instances deployed a way to escalate out of their namespace isolation and affect the entire cluster.
~~~
Tracker accuracy feedback form: https://docs.google.com/forms/d/e/1FAIpQLSfa6zTaEGohRdiIqGVAvWTSAL0kpO_DkkEICuIHzQHFwmKswg/viewform
- links to