Miggo Logo

CVE-2024-29893:
ArgoCD's repo server has Uncontrolled Resource Consumption vulnerability

6.5

CVSS Score

Basic Information

EPSS Score
-
Published
3/29/2024
Updated
3/29/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/argoproj/argo-cd/v2go>= 2.4.0, < 2.8.142.8.14
github.com/argoproj/argo-cd/v2go>= 2.9.0, < 2.9.102.9.10
github.com/argoproj/argo-cd/v2go>= 2.10.0, < 2.10.52.10.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from lack of size limits when loading Helm registry indexes. The pre-patch loadRepoIndex used io.ReadAll() on unbounded HTTP responses, while GetIndex triggered this vulnerable operation. The patch adds a maxIndexSize parameter and io.LimitReader to enforce limits. The functions' pre-patch behavior matches the vulnerability description of uncontrolled resource consumption through OOM attacks via malicious registries.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *ll v*rsions o* *r*o** st*rtin* *rom v*.* **v* * *u* w**r* t** *r*o** r*po-s*rv*r *ompon*nt is vuln*r**l* to * **ni*l-o*-S*rvi** *tt**k v**tor. Sp**i*i**lly, it's possi*l* to *r*s* t** r*po s*rv*r *ompon*nt t*rou** *n out o* m*mory *rror

Reasoning

T** vuln*r**ility st*ms *rom l**k o* siz* limits w**n lo**in* **lm r**istry in**x*s. T** pr*-p*t** lo**R*poIn**x us** io.R****ll() on un*oun*** *TTP r*spons*s, w*il* **tIn**x tri***r** t*is vuln*r**l* op*r*tion. T** p*t** ***s * m*xIn**xSiz* p*r*m*t*