UNIX Symbolic Link (Symlink) Following Affecting github.com/argoproj/argo-cd/v2/reposerver/repository package, versions >=0.7.0 <2.1.15 >=2.2.8 <2.2.9 >=2.3.3 <2.3.4
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDV2REPOSERVERREPOSITORY-2838874
- published 19 May 2022
- disclosed 18 May 2022
- credit crenshaw-dev
Introduced: 18 May 2022
CVE-2022-24904 Open this link in a new tabHow to fix?
Upgrade github.com/argoproj/argo-cd/v2/reposerver/repository
to version 2.1.15, 2.2.9, 2.3.4 or higher.
Overview
Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following. A malicious Argo CD user with write access for a repository that is used in a directory-type Application may commit a symlink that points to an out-of-bounds file.
Notes:
If the target file is a valid JSON or YAML manifest file, and the resource is allowed in the Application, the attacker can read the contents of that manifest file. (In versions <2.3.2, <2.2.8, and <2.1.14, the attacker may read the contents of the file even if the resource is not allowed in the Application).
If the target file is valid JSON but is not a manifest file, the attacker may read the contents of the file.
If the target file is not valid JSON or YAML, the attacker may read partial file contents (usually just the first character of the file).