github.com/argoproj/argo-workflows is vulnerable to privilege escalation. An attacker can create a workflow through the newHTTPServer
function of argoserver.go
that produces an HTML artifact and makes XRL calls to the Argo Server API by using a script, allowing the attacker to send malicious emails to that artifact with deep links, resulting in workflow modifications.
github.com/argoproj/argo-workflows/commit/29f3ad8446ac5f07abda0f6844f3a31a7d50eb23
github.com/argoproj/argo-workflows/commit/87470e1c2bf703a9110e97bb755614ce8757fdcc
github.com/argoproj/argo-workflows/commit/877216e2159f07bfb27aa1991aa249bc2e9a250c
github.com/argoproj/argo-workflows/pull/8585
github.com/argoproj/argo-workflows/security/advisories/GHSA-cmv8-6362-r5w9