mirror of
https://github.com/argoproj/argo-cd.git
synced 2026-02-20 01:28:45 +01:00
docs: Update documentation for CVE-2020-5260 (#3421)
This commit is contained in:
27
CHANGELOG.md
27
CHANGELOG.md
@@ -1,5 +1,32 @@
|
||||
# Changelog
|
||||
|
||||
## v1.5.2 (2020-04-20)
|
||||
|
||||
#### Critical security fix
|
||||
|
||||
This release contains a critical security fix. Please refer to the
|
||||
[security document](https://argoproj.github.io/argo-cd/security_considerations/#CVE-2020-5260-possible-git-credential-leak)
|
||||
for more information.
|
||||
|
||||
**Upgrading is strongly recommended**
|
||||
|
||||
## v1.4.3 (2020-04-20)
|
||||
|
||||
#### Critical security fix
|
||||
|
||||
This release contains a critical security fix. Please refer to the
|
||||
[security document](https://argoproj.github.io/argo-cd/security_considerations/#CVE-2020-5260-possible-git-credential-leak)
|
||||
for more information.
|
||||
|
||||
## v1.5.1 (2020-04-06)
|
||||
|
||||
#### Bug Fixes
|
||||
|
||||
* fix: return 401 error code if username does not exist (#3369)
|
||||
* fix: Do not panic while running hooks with short revision (#3368)
|
||||
* fix: Increase HAProxy check interval to prevent intermittent failures (#3356)
|
||||
* fix: Helm v3 CRD are not deployed (#3345)
|
||||
|
||||
## v1.5.0 (2020-04-02)
|
||||
|
||||
#### Helm Integration Enhancements - Helm 3 Support And More
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
# Security Considerations
|
||||
|
||||
As a deployment tool, Argo CD needs to have production access which makes security a very important topic.
|
||||
As a deployment tool, Argo CD needs to have production access which makes security a very important topic.
|
||||
The Argoproj team takes security very seriously and continuously working on improving it. Learn more about security
|
||||
related features in [Security](./operator-manual/security.md) section.
|
||||
|
||||
@@ -13,6 +13,7 @@ no fix yet.
|
||||
|
||||
|Date|CVE|Title|Risk|Affected version(s)|Fix version|
|
||||
|----|---|-----|----|-------------------|-----------|
|
||||
|2020-04-14|[CVE-2020-5260](https://nvd.nist.gov/vuln/detail/CVE-2020-5260)|Possible Git credential leak|Critical|all|v1.4.3,v1.5.2|
|
||||
|2020-04-08|[CVE-2020-11576](https://nvd.nist.gov/vuln/detail/CVE-2020-11576)|User Enumeration|Medium|v1.5.0|v1.5.1|
|
||||
|2020-04-08|[CVE-2020-8826](https://nvd.nist.gov/vuln/detail/CVE-2020-8826)|Session-fixation|High|all|n/a|
|
||||
|2020-04-08|[CVE-2020-8827](https://nvd.nist.gov/vuln/detail/CVE-2020-8827)|Insufficient anti-automation/anti-brute force|High|all|n/a|
|
||||
@@ -25,6 +26,41 @@ A recent security audit (thanks a lot to [Matt Hamilton](https://github.com/Erin
|
||||
has revealed several limitations in Argo CD which could compromise security.
|
||||
Most of the issues are related to the built-in user management implementation.
|
||||
|
||||
### CVE-2020-5260 - Possible Git credential leak
|
||||
|
||||
**Summary:**
|
||||
|
||||
|Risk|Reported by|Fix version|Workaround|
|
||||
|----|-----------|-----------|----------|
|
||||
|Critical|Felix Wilhelm of Google Project Zero|v1.4.3,v1.5.2|Yes|
|
||||
|
||||
**Details:**
|
||||
|
||||
ArgoCD relies on Git for many of its operations. The Git project released a
|
||||
[security advisory](https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q)
|
||||
on 2020-04-14, describing a serious vulnerability in Git which can lead to credential
|
||||
leakage through credential helpers by feeding malicious URLs to the `git clone`
|
||||
operation.
|
||||
|
||||
We do not believe ArgoCD is affected by this vulnerability, because ArgoCD does neither
|
||||
make use of Git credential helpers nor does it use `git clone` for repository operations.
|
||||
However, we do not know whether our users might have configured Git credential helpers on
|
||||
their own and chose to release new images which contain the bug fix for Git.
|
||||
|
||||
**Mitigation and/or workaround:**
|
||||
|
||||
We strongly recommend to upgrade your ArgoCD installation to either `v1.4.3` (if on v1.4
|
||||
branch) or `v1.5.2` (if on v1.5 branch)
|
||||
|
||||
|
||||
When you are running `v1.4.x`, you can upgrade to `v1.4.3` by simply changing the image
|
||||
tags for `argocd-server`, `argocd-repo-server` and `argocd-controller` to `v1.4.3`.
|
||||
The `v1.4.3` release does not contain additional functional bug fixes.
|
||||
|
||||
Likewise, hen you are running `v1.5.x`, you can upgrade to `v1.5.2` by simply changing
|
||||
the image tags for `argocd-server`, `argocd-repo-server` and `argocd-controller` to `v1.5.2`.
|
||||
The `v1.5.2` release does not contain additional functional bug fixes.
|
||||
|
||||
### CVE-2020-11576 - User Enumeration
|
||||
|
||||
**Summary:**
|
||||
|
||||
Reference in New Issue
Block a user