GHSA-rc7p-gmvh-xfx2 – github.com/argoproj/argo-workflows
Package
Manager: go
Name: github.com/argoproj/argo-workflows
Vulnerable Version: >=0 <3.0.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: N/A pctlN/A
Details
Attack on Kubernetes via Misconfigured Argo Workflows ### Impact Users running using the Argo Server with `--auth-mode=server` (which is the default < v3.0.0) AND have exposed their UI to the Internet may allow remote users to execute arbitrary code on their cluster, e.g. crypto-mining. ### Resolution * Do not expose your user interface to the Internet. * Change configuration. `--auth-mode=client`. For users using an older 2.x version of Argo Server, consider upgrading to Argo Server version 3.x or later.
Metadata
Created: 2021-08-02T17:19:52Z
Modified: 2021-08-02T17:18:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-rc7p-gmvh-xfx2/GHSA-rc7p-gmvh-xfx2.json
CWE IDs: []
Alternative ID: N/A
Finding: F039
Auto approve: 1