We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It has been discovered that an unprivileged pod in a different namespace on the same cluster could connect to the Redis server on port 6379. Despite having installed the latest version of the VPC CNI plugin on the EKS cluster, it requires manual enablement through configuration to enforce network policies. This raises concerns that many clients might unknowingly have open access to their Redis servers. This vulnerability could lead to Privilege Escalation to the level of cluster controller, or to information leakage, affecting anyone who does not have strict access controls on their Redis instance. This issue has been patched in version(s) 2.8.19, 2.9.15 and 2.10.10.
Reserved 2024-04-08 | Published 2024-05-21 | Updated 2024-08-02 | Assigner GitHub_MCWE-327: Use of a Broken or Risky Cryptographic Algorithm
github.com/...rgo-cd/security/advisories/GHSA-9766-5277-j5hr
github.com/...ommit/2de0ceade243039c120c28374016c04ff9590d1d
github.com/...ommit/35a7d6c7fa1534aceba763d6a68697f36c12e678
github.com/...ommit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c
github.com/...ommit/53570cbd143bced49d4376d6e31bd9c7bd2659ff
github.com/...ommit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12
github.com/...ommit/9552034a80070a93a161bfa330359585f3b85f07
github.com/...ommit/bdd889d43969ba738ddd15e1f674d27964048994
github.com/...ommit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0
Support options