A path traversal issue was found in the (g *GitArtifactReader).Read() API. Read()
calls into (g *GitArtifactReader).readFromRepository()
that opens and reads the file that contains the trigger resource definition:
func (g *GitArtifactReader) readFromRepository(r *git.Repository, dir string)
No checks are made on this file at read time, which could lead an attacker to read files anywhere on the system. This could be achieved by either using symbolic links, or putting ../
in the path.
A patch for this vulnerability has been released in the following Argo Events version:
v1.7.1
Disclosed by Ada Logics in a security audit sponsored by CNCF and facilitated by OSTIF.
Open an issue in the Argo Events issue tracker or discussions
Join us on Slack in channel #argo-events
CPE | Name | Operator | Version |
---|---|---|---|
github.com/argoproj/argo-events | lt | 1.7.1 |
github.com/argoproj/argo-events
github.com/argoproj/argo-events/commit/d0f66dbce78bc31923ca057b20fc722aa24ca961
github.com/argoproj/argo-events/issues/1947
github.com/argoproj/argo-events/pull/1965
github.com/argoproj/argo-events/security/advisories/GHSA-qpgx-64h2-gc3c
nvd.nist.gov/vuln/detail/CVE-2022-25856
pkg.go.dev/vuln/GO-2022-0492
snyk.io/vuln/SNYK-GOLANG-GITHUBCOMARGOPROJARGOEVENTSSENSORSARTIFACTS-2864522