CVE-2024-29893:
ArgoCD's repo server has Uncontrolled Resource Consumption vulnerability
6.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
3/29/2024
Updated
3/29/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/argoproj/argo-cd/v2 | go | >= 2.4.0, < 2.8.14 | 2.8.14 |
github.com/argoproj/argo-cd/v2 | go | >= 2.9.0, < 2.9.10 | 2.9.10 |
github.com/argoproj/argo-cd/v2 | go | >= 2.10.0, < 2.10.5 | 2.10.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from lack of size limits when loading Helm registry indexes. The pre-patch loadRepoIndex used io.ReadAll() on unbounded HTTP responses, while GetIndex triggered this vulnerable operation. The patch adds a maxIndexSize parameter and io.LimitReader to enforce limits. The functions' pre-patch behavior matches the vulnerability description of uncontrolled resource consumption through OOM attacks via malicious registries.