UNIX Symbolic Link (Symlink) Following Affecting github.com/argoproj/argo-cd/v2/reposerver/repository Open this link in a new tab package, versions >=0.7.0 <2.1.15 >=2.2.8 <2.2.9 >=2.3.3 <2.3.4


0.0
medium
  • Attack Complexity

    Low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDV2REPOSERVERREPOSITORY-2838874

  • published

    19 May 2022

  • disclosed

    18 May 2022

  • credit

    crenshaw-dev

How to fix?

Upgrade github.com/argoproj/argo-cd/v2/reposerver/repository to version 2.1.15, 2.2.9, 2.3.4 or higher.

Overview

Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following. A malicious Argo CD user with write access for a repository that is used in a directory-type Application may commit a symlink that points to an out-of-bounds file.

Notes:

  1. If the target file is a valid JSON or YAML manifest file, and the resource is allowed in the Application, the attacker can read the contents of that manifest file. (In versions <2.3.2, <2.2.8, and <2.1.14, the attacker may read the contents of the file even if the resource is not allowed in the Application).

  2. If the target file is valid JSON but is not a manifest file, the attacker may read the contents of the file.

  3. If the target file is not valid JSON or YAML, the attacker may read partial file contents (usually just the first character of the file).