Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It has been discovered that an unprivileged pod in a different namespace on the same cluster could connect to the Redis server on port 6379. Despite having installed the latest version of the VPC CNI plugin on the EKS cluster, it requires manual enablement through configuration to enforce network policies. This raises concerns that many clients might unknowingly have open access to their Redis servers. This vulnerability could lead to Privilege Escalation to the level of cluster controller, or to information leakage, affecting anyone who does not have strict access controls on their Redis instance. This issue has been patched in version(s) 2.8.19, 2.9.15 and 2.10.10.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Argoproj argo Cd
|
|
CPEs | cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:* | |
Vendors & Products |
Argoproj argo Cd
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T01:59:50.839Z
Reserved: 2024-04-08T13:48:37.491Z
Link: CVE-2024-31989

Updated: 2024-05-22T14:58:43.998Z

Status : Analyzed
Published: 2024-05-21T19:15:09.770
Modified: 2025-01-09T16:56:47.220
Link: CVE-2024-31989
