We are not aware of any exploits. This is a pro-active fix.
Impacted:
--secure=true or >= v3.0 with --secure unspecified (note - running in secure mode is recommended regardless).The Argo Server's keys are packaged within the image. They could be extracted and used to decrypt traffic, or forge requests.
https://github.com/argoproj/argo-workflows/pull/6540
This was identified by engineers at Jetstack.io
{
"nvd_published_at": null,
"severity": "MODERATE",
"github_reviewed_at": "2021-08-23T17:02:24Z",
"github_reviewed": true,
"cwe_ids": []
}