Argo Server TLS requests could be forged by attacker with network access
Moderate severity
GitHub Reviewed
Published
Aug 18, 2021
in
argoproj/argo-workflows
•
Updated Jan 9, 2023
Package
Affected versions
>= 3.0.0, < 3.0.9
>= 3.1.0, < 3.1.6
Patched versions
3.0.9
3.1.6
Description
Reviewed
Aug 23, 2021
Published to the GitHub Advisory Database
Aug 23, 2021
Last updated
Jan 9, 2023
Impact
We are not aware of any exploits. This is a pro-active fix.
Impacted:
--secure=true
or >= v3.0 with--secure
unspecified (note - running in secure mode is recommended regardless).The Argo Server's keys are packaged within the image. They could be extracted and used to decrypt traffic, or forge requests.
Patches
argoproj/argo-workflows#6540
Workarounds
This was identified by engineers at Jetstack.io
References