CVE-2022-25856 – github.com/argoproj/argo-events
Package
Manager: go
Name: github.com/argoproj/argo-events
Vulnerable Version: >=0 <1.7.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00984 pctl0.75939
Details
Insecure path traversal in Git Trigger Source can lead to arbitrary file read ### Impact A path traversal issue was found in the `(g *GitArtifactReader).Read() API. Read()` calls into `(g *GitArtifactReader).readFromRepository()` that opens and reads the file that contains the trigger resource definition: ```go func (g *GitArtifactReader) readFromRepository(r *git.Repository, dir string) ``` No checks are made on this file at read time, which could lead an attacker to read files anywhere on the system. This could be achieved by either using symbolic links, or putting `../` in the path. ### Patches A patch for this vulnerability has been released in the following Argo Events version: v1.7.1 ### Credits Disclosed by [Ada Logics](https://adalogics.com/) in a security audit sponsored by CNCF and facilitated by OSTIF. ### For more information Open an issue in the [Argo Events issue tracker](https://github.com/argoproj/argo-events/issues) or [discussions](https://github.com/argoproj/argo-events/discussions) Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-events
Metadata
Created: 2022-06-17T01:03:47Z
Modified: 2024-05-20T21:27:26Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-qpgx-64h2-gc3c/GHSA-qpgx-64h2-gc3c.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-qpgx-64h2-gc3c
Finding: F063
Auto approve: 1