UNIX Symbolic Link (Symlink) Following Affecting github.com/argoproj/argo-cd/v2/reposerver/repository package, versions >=0.7.0 <2.1.15 >=2.2.8 <2.2.9 >=2.3.3 <2.3.4


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.1% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDV2REPOSERVERREPOSITORY-2838874
  • published 19 May 2022
  • disclosed 18 May 2022
  • credit crenshaw-dev

How to fix?

Upgrade github.com/argoproj/argo-cd/v2/reposerver/repository to version 2.1.15, 2.2.9, 2.3.4 or higher.

Overview

Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following. A malicious Argo CD user with write access for a repository that is used in a directory-type Application may commit a symlink that points to an out-of-bounds file.

Notes:

  1. If the target file is a valid JSON or YAML manifest file, and the resource is allowed in the Application, the attacker can read the contents of that manifest file. (In versions <2.3.2, <2.2.8, and <2.1.14, the attacker may read the contents of the file even if the resource is not allowed in the Application).

  2. If the target file is valid JSON but is not a manifest file, the attacker may read the contents of the file.

  3. If the target file is not valid JSON or YAML, the attacker may read partial file contents (usually just the first character of the file).

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
4.3 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    None
  • Availability (A)
    None
Expand this section

NVD

4.3 medium