Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/argoproj/argo-cd/v2
  4. ›
  5. CVE-2023-50726

CVE-2023-50726: Users with `create` but not `override` privileges can perform local sync

March 15, 2024

Impact

“Local sync” is an Argo CD feature that allows developers to temporarily override an Application’s manifests with locally-defined manifests. Use of the feature should generally be limited to highly-trusted users, since it allows the user to bypass any merge protections in git.

An improper validation bug allows users who have create privileges but not override privileges to sync local manifests on app creation. All other restrictions, including AppProject restrictions are still enforced. The only restriction which is not enforced is that the manifests come from some approved git/Helm/OCI source.

The bug was introduced in 1.2.0-rc1 when the local manifest sync feature was added.

Patches

The bug has been patched in the following versions:

  • 2.10.3
  • 2.9.8
  • 2.8.12

Workarounds

To immediately mitigate the risk of branch protection bypass, remove applications, create RBAC access. The only way to eliminate the issue without removing RBAC access is to upgrade to a patched version.

Branch protection rules and review requirements are a great way to enforce security constraints in a GitOps environment, but they should be just one layer in a multi-layered approach. Make sure your AppProject and RBAC restrictions are as thorough as possible to prevent a review bypass vulnerability from permitting excessive damage.

References

  • Argo CD RBAC documentation

For more information

  • Open an issue in the Argo CD issue tracker or discussions
  • Join us on Slack in channel #argo-cd

References

  • argo-cd.readthedocs.io/en/latest/operator-manual/rbac
  • github.com/advisories/GHSA-g623-jcgg-mhmm
  • github.com/argoproj/argo-cd
  • github.com/argoproj/argo-cd/commit/3b8f673f06c2d228e01cbc830e5cb57cef008978
  • github.com/argoproj/argo-cd/security/advisories/GHSA-g623-jcgg-mhmm
  • nvd.nist.gov/vuln/detail/CVE-2023-50726

Code Behaviors & Features

Detect and mitigate CVE-2023-50726 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.0.0-rc3 before 2.8.12, all versions starting from 2.9.0 before 2.9.8, all versions starting from 2.10.0 before 2.10.3

Fixed versions

  • 2.9.8
  • 2.10.3
  • 2.8.12

Solution

Upgrade to versions 2.10.3, 2.8.12, 2.9.8 or above.

Impact 6.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-269: Improper Privilege Management

Source file

go/github.com/argoproj/argo-cd/v2/CVE-2023-50726.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:36 +0000.