Cryptographic Issues Affecting github.com/argoproj/argo-workflows/v3/cmd/argo/commands package, versions >=3.1.0 <3.1.7>=3.0.0 <3.0.9


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cryptographic Issues vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMARGOPROJARGOWORKFLOWSV3CMDARGOCOMMANDS-1569193
  • published24 Aug 2021
  • disclosed23 Aug 2021
  • creditJetstack.io

Introduced: 23 Aug 2021

CVE NOT AVAILABLE CWE-310  (opens in a new tab)

How to fix?

Upgrade github.com/argoproj/argo-workflows/v3/cmd/argo/commands to version 3.1.7, 3.0.9 or higher.

Overview

github.com/argoproj/argo-workflows/v3/cmd/argo/commands is a workflow engine for Kubernetes.

Affected versions of this package are vulnerable to Cryptographic Issues. Argo Server TLS requests could be forged by an attacker with network access. We are not aware of any exploits. This is a pro-active fix.

You are impacted if:

  • You are running Argo Server less than v3.0 with --secure=true or greater than or equal to v3.0 with --secure unspecified (note - running in secure mode is recommended regardless).
  • The attacker is within your network. If you expose Argo Server to the Internet then "your network" is "the Internet".
  • The Argo Server's keys are packaged within the image. They could be extracted and used to decrypt traffic, or forge requests.

References

CVSS Scores

version 3.1