UNIX Symbolic Link (Symlink) Following Affecting github.com/argoproj/argo-cd/v2/util/io/files package, versions >=0.7.0 <2.1.15 >=2.2.8 <2.2.9 >=2.3.3 <2.3.4


0.0
medium

Snyk CVSS

    Attack Complexity Low

    Threat Intelligence

    EPSS 0.11% (45th percentile)
Expand this section
NVD
4.3 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDV2UTILIOFILES-2838875
  • published 19 May 2022
  • disclosed 18 May 2022
  • credit crenshaw-dev

How to fix?

Upgrade github.com/argoproj/argo-cd/v2/util/io/files to version 2.1.15, 2.2.9, 2.3.4 or higher.

Overview

github.com/argoproj/argo-cd/v2/util/io/files is a declarative, GitOps continuous delivery tool for Kubernetes.

Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following. A malicious Argo CD user with write access for a repository that is used in a directory-type Application may commit a symlink that points to an out-of-bounds file.

Notes:

  1. If the target file is a valid JSON or YAML manifest file, and the resource is allowed in the Application, the attacker can read the contents of that manifest file. (In versions <2.3.2, <2.2.8, and <2.1.14, the attacker may read the contents of the file even if the resource is not allowed in the Application).

  2. If the target file is valid JSON but is not a manifest file, the attacker may read the contents of the file.

  3. If the target file is not valid JSON or YAML, the attacker may read partial file contents (usually just the first character of the file).