Vulnerability Description
Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously. The configuration is leaked through the /api endpoint on the local server that is responsible for serving the Garden dashboard. At the moment, this server is accessible to 0.0.0.0 which makes it accessible to anyone on the same network (or anyone on the internet if they are on a public, static IP). This may lead to the ability to compromise credentials, secrets or environment variables. Users are advised to upgrade to version 0.12.39 as soon as possible. Users unable to upgrade should use a firewall blocking access to port 9777 from all untrusted network machines.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Garden | Garden | < 0.12.39 |
Related Weaknesses (CWE)
References
- https://github.com/garden-io/garden/commit/56051a5b50409227bc420910da88ed156a6e4PatchThird Party Advisory
- https://github.com/garden-io/garden/security/advisories/GHSA-f5f3-qrqw-2vqfThird Party Advisory
- https://github.com/garden-io/garden/commit/56051a5b50409227bc420910da88ed156a6e4PatchThird Party Advisory
- https://github.com/garden-io/garden/security/advisories/GHSA-f5f3-qrqw-2vqfThird Party Advisory
FAQ
What is CVE-2022-24829?
CVE-2022-24829 is a vulnerability with a CVSS score of 8.1 (HIGH). Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an atta...
How severe is CVE-2022-24829?
CVE-2022-24829 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-24829?
Check the references section above for vendor advisories and patch information. Affected products include: Garden Garden.