UNIX Symbolic Link (Symlink) Following Affecting github.com/argoproj/argo-cd/v2/reposerver/repository package, versions >=0.7.0 <2.1.15>=2.2.8 <2.2.9>=2.3.3 <2.3.4


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMARGOPROJARGOCDV2REPOSERVERREPOSITORY-2838874
  • published19 May 2022
  • disclosed18 May 2022
  • creditcrenshaw-dev

Introduced: 18 May 2022

CVE-2022-24904  (opens in a new tab)
CWE-61  (opens in a new tab)

How to fix?

Upgrade github.com/argoproj/argo-cd/v2/reposerver/repository to version 2.1.15, 2.2.9, 2.3.4 or higher.

Overview

Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following. A malicious Argo CD user with write access for a repository that is used in a directory-type Application may commit a symlink that points to an out-of-bounds file.

Notes:

  1. If the target file is a valid JSON or YAML manifest file, and the resource is allowed in the Application, the attacker can read the contents of that manifest file. (In versions <2.3.2, <2.2.8, and <2.1.14, the attacker may read the contents of the file even if the resource is not allowed in the Application).

  2. If the target file is valid JSON but is not a manifest file, the attacker may read the contents of the file.

  3. If the target file is not valid JSON or YAML, the attacker may read partial file contents (usually just the first character of the file).

CVSS Scores

version 3.1