Security News > 2022 > February > Argo CD Security Bug Opens Kubernetes Cloud Apps to Attackers

A high-severity security vulnerability in Argo CD can enable attackers to access targets' application-development environments, paving the way for stealing passwords, API keys, tokens and other sensitive information.
Argo CD is a continuous-delivery platform deployed as a Kubernetes controller in the cloud, and it's used to deploy applications, then continuously monitor them in real time as they run.
The bug is a path-traversal issue, according to Apiiro's security-research team, which occurs when adversaries are able to access files and directories that are stored outside their permissioned purview.
Attackers can exploit the bug by loading a malicious Kubernetes Helm Chart YAML file into the Argo CD system, then using it to "Hop" from their own application ecosystem to access other applications' data, researchers said.
The file includes "The metadata and information needed to deploy the appropriate Kubernetes configuration, and the ability to dynamically update the cloud configuration as the manifest is being modified."
Argo CD's anti-path-traversal mechanism is handled by single file in the source code, according to the analysis.
News URL
https://threatpost.com/argo-cd-security-bug-kubernetes-cloud-apps/178239/
Related news
- How CISOs can balance security and business agility in the cloud (source)
- Balancing cloud security with performance and availability (source)
- Avoiding vendor lock-in when using managed cloud security services (source)
- Why multi-cloud security needs a fresh approach to stay resilient (source)
- Cloud security gains overshadowed by soaring storage fees (source)
- Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security (source)
- Google to purchase Wiz for $32 billion in cloud security play (source)
- Cloud providers aren’t delivering on security promises (source)
- There are 10,000 reasons to doubt Oracle Cloud's security breach denial (source)
- Cloud security explained: What’s left exposed? (source)