Categories: Cyber Security News

Kubernetes DNS Exploit Enables Git Credential Theft from ArgoCD

Hello world, hello hackers! We’re Future Sight—your soon-to-be favorite research group.

Never heard of us? Don’t worry, nobody has. This is literally our first drop.

Today, we will make some red teamers happy with a new technique we have discovered that allows an authenticated user in ArgoCD to steal powerful GitHub credentials, further compromising Git accounts and more.

For those who like Kubernetes security, you will enjoy even more! Let’s dive into the world of ArgoCD, Kubernetes, and Git and use the goddamn octopus against itself!

It’s the year 2025, and exfiltration of information is a buzz theme in cybersecurity, especially in those poor password managers.

We want to contribute to that chaos a little bit and raise awareness among everyone in the cybersecurity field by demonstrating a way to exfiltrate Git credentials in ArgoCD and Kubernetes.

ArgoCD is considered by most to be the best tool in GitOps continuous delivery for Kubernetes, ranking first in the CNAF “Continuous Integration & Delivery” landscape.

Similar tools might also allow these attacks, so buckle up, kids; this is going to be an interesting ride!

The Exploit

Kubernetes DNS is the first place a pod looks when resolving a domain. Our attack abuses that behavior to trick ArgoCD’s repository server into connecting to an attacker-controlled service instead of the real GitHub.

Overview of the infrastructure

By deploying a malicious Service named github in the com namespace, an adversary can create a DNS record that resolves github.com to their cluster‐internal IP.

When ArgoCD fetches manifests via HTTPS, the attacker adds a custom certificate through ArgoCD’s certificate feature, allowing inspection of the Authorization header and exfiltration of credentials.

Both HTTP(S) Basic auth tokens (for Git or Helm) and GitHub App JWTs or access tokens can be captured.

The attacker then proxies requests to the legitimate GitHub endpoint to maintain operation while silently siphoning credentials.

The compromised ArgoCD account must possess policies to create certificates, read repositories, applications, clusters, and, optionally, view logs.

Once an adversary satisfies these prerequisites, they deploy the malicious Argexfil service, intercept ArgoCD’s Git connections, and log credentials externally.

A proof‐of‐concept script (argexfil_verify.py) is available on our GitHub for verifying permissions and automating the deployment.

Mitigations and Future Work

To defend against this novel attack, apply least‐privilege principles for ArgoCD users, enforce strict project scopes, and monitor internal DNS and pod‐to‐pod traffic.

Restrict certificate creation to administrators and favor SSH connections, which do not leak private keys.

Generate GitHub tokens with minimal scope. Future research may explore injecting malicious YAML manifests, exploiting ArgoCD notifications for exfiltration, or targeting cluster authentication secrets via the same DNS trick.

Similar techniques could impact Flux, CircleCI, and other GitOps platforms.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

The post Kubernetes DNS Exploit Enables Git Credential Theft from ArgoCD appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

‘Good empathy and a good ear’: New women’s health clinic brings attention to midlife, menopause and individualized care

For years, Trisha Brooks and Veronica Triaca have seen female patients navigating the hormonal and…

23 minutes ago

Concord votes to remove Memorial Field bleachers as talk of single city-wide school district surfaces

The Concord City Council voted Monday night to tear down the aging bleachers at Memorial…

24 minutes ago

State investment in cancer screenings spotlights firefighting’s high personal cost

Firefighters formed a solemn corridor along the streets outside St. Joseph Cathedral, dressed in crisp…

24 minutes ago

UNH police chief resigns following DUI

University of New Hampshire Police Chief Steven Lee has resigned, two months after being arrested…

24 minutes ago

Warner Bros. Confirms Game of Thrones Movie, Aegon’s Conquest, is in the Works

At CinemaCon in Las Vegas today, Warner Bros. officially confirmed it is making a Game…

1 hour ago

Marvel Suffers Layoffs in Wake of New Job Cuts at Disney

Marvel has been hit with layoffs as part of job cuts at Disney affecting up…

2 hours ago

This website uses cookies.