Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/argoproj/argo-workflows/v3/util/kubeconfig
to version 3.1.6, 3.0.9 or higher.
github.com/argoproj/argo-workflows/v3/util/kubeconfig is a Workflow engine for Kubernetes
Affected versions of this package are vulnerable to Privilege Escalation. Potential privilege escalation when the Argo Sever is run with --auth-mode=client
. This is a pro-active fix. No know exploits exist. You are impacted if:
v1.19
--auth-mode=client
--auth-mode=server
The client's authentication will be ignored and the server's authentication will be used. This will result in privilege escalation to that of the the server's account.