Miggo Logo

CVE-2022-1025: Argo CD improper access control bug can allow malicious user to escalate privileges to admin level

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.25812%
Published
7/13/2022
Updated
6/27/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/argoproj/argo-cdgo>= 0.5.0, <= 1.8.7
github.com/argoproj/argo-cd/v2go< 2.1.142.1.14
github.com/argoproj/argo-cd/v2go>= 2.2.0, < 2.2.82.2.8
github.com/argoproj/argo-cd/v2go>= 2.3.0, < 2.3.22.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from missing project-based access control checks in resource traversal and validation logic. Key evidence includes:

  1. The patch added project permission checks (IsResourcePermitted) in controller/appcontroller.go's resource tree construction
  2. server/application.go changes show stricter validation for resource UIDs and project permissions
  3. The introduction of AppProject.IsResourcePermitted in app_project_types.go indicates previous validation was insufficient
  4. Test cases in app_management_test.go were updated to verify project-based restrictions, confirming the exploit path involved these functions

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

# Imp**t ## Imp**ts *or v*rsions st*rtin* wit* v*.*.* *ll unp*t**** v*rsions o* *r*o ** st*rtin* wit* v*.*.* *r* vuln*r**l* to *n improp*r ****ss *ontrol *u*, *llowin* * m*li*ious us*r to pot*nti*lly *s**l*t* t**ir privil***s to **min-l*v*l. To p*r

Reasoning

T** vuln*r**ility st*mm** *rom missin* proj**t-**s** ****ss *ontrol ****ks in r*sour** tr*v*rs*l *n* v*li**tion lo*i*. K*y *vi**n** in*lu**s: *. T** p*t** ***** proj**t p*rmission ****ks (IsR*sour**P*rmitt**) in *ontroll*r/*pp*ontroll*r.*o's r*sour**