Arbitrary Code Execution Affecting github.com/argoproj/argo-workflows/v3/cmd/argo/commands package, versions <3.1.0


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMARGOPROJARGOWORKFLOWSV3CMDARGOCOMMANDS-1535814
  • published3 Aug 2021
  • disclosed2 Aug 2021
  • creditRyan Robinson, Nicole Fishbein

Introduced: 2 Aug 2021

CVE NOT AVAILABLE CWE-94  (opens in a new tab)

How to fix?

Upgrade github.com/argoproj/argo-workflows/v3/cmd/argo/commands to version 3.1.0 or higher.

Overview

github.com/argoproj/argo-workflows/v3/cmd/argo/commands is a workflow engine for Kubernetes.

Affected versions of this package are vulnerable to Arbitrary Code Execution. Users running using the Argo Server with --auth-mode=server (which is the default before version 3.0.0) and have exposed their UI to the internet may allow remote users to execute arbitrary code on their cluster.

CVSS Scores

version 3.1