GHSA-h563-xh25-x54q

Suggest an improvement
Source
https://github.com/advisories/GHSA-h563-xh25-x54q
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-h563-xh25-x54q/GHSA-h563-xh25-x54q.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-h563-xh25-x54q
Aliases
Published
2021-08-09T20:37:50Z
Modified
2024-08-21T16:29:02.966721Z
Summary
Workflow re-write vulnerability using input parameter
Details

Impact

  • Allow end-users to set input parameters, but otherwise expect workflows to be secure.

Patches

Not yet.

Workarounds

  • Set EXPRESSION_TEMPLATES=false for the workflow controller

References

  • https://github.com/argoproj/argo-workflows/issues/6441

For more information

If you have any questions or comments about this advisory: * Open an issue in example link to repo * Email us at example email address

Database specific
{
    "nvd_published_at": "2021-08-03T00:15:00Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2021-08-04T18:26:07Z"
}
References

Affected packages

Go / github.com/argoproj/argo-workflows/v3

Package

Name
github.com/argoproj/argo-workflows/v3
View open source insights on deps.dev
Purl
pkg:golang/github.com/argoproj/argo-workflows/v3

Affected ranges

Type
SEMVER
Events
Introduced
3.1.0
Fixed
3.1.6