diff --git a/http/cves/2024/CVE-2024-37152.yaml b/http/cves/2024/CVE-2024-37152.yaml new file mode 100644 index 0000000000..620958d238 --- /dev/null +++ b/http/cves/2024/CVE-2024-37152.yaml @@ -0,0 +1,40 @@ +id: CVE-2024-37152 + +info: + name: Argo CD Unauthenticated Access to sensitive setting + author: DhiyaneshDk + severity: medium + description: | + Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The vulnerability allows unauthorized access to the sensitive settings exposed by /api/v1/settings endpoint without authentication. All sensitive settings are hidden except passwordPattern. + reference: + - https://github.com/argoproj/argo-cd/security/advisories/GHSA-87p9-x75h-p4j2 + - https://nvd.nist.gov/vuln/detail/CVE-2024-37152 + metadata: + verified: true + max-request: 1 + shodan-query: html:"Argo CD" + tags: cve,cve2024,argo-cd,info-leak + +http: + - raw: + - | + GET /api/v1/settings HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '"passwordPattern":' + - '"appLabelKey":' + condition: and + + - type: word + part: content_type + words: + - 'application/json' + + - type: status + status: + - 200