Insufficient Entropy Affecting github.com/argoproj/argo-cd/v2/controller package, versions <2.1.16 >=2.2.0 <2.2.10 >=2.3.0 <2.3.5 >=2.4.0 <2.4.1
Threat Intelligence
EPSS
0.35% (73rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDV2CONTROLLER-2933567
- published 22 Jun 2022
- disclosed 15 Jun 2022
- credit crenshaw-dev, AdamKorcz and DavidKorczynski
Introduced: 15 Jun 2022
CVE-2022-31034 Open this link in a new tabHow to fix?
Upgrade github.com/argoproj/argo-cd/v2/controller
to version 2.1.16, 2.2.10, 2.3.5, 2.4.1 or higher.
Overview
Affected versions of this package are vulnerable to Insufficient Entropy when an SSO
login is initiated from the CLI or UI. This is due to the use of insufficiently random values in parameters in Oauth2/OIDC
login flows.
References
CVSS Scores
version 3.1