We are not aware of any exploits. This is a pro-active fix.
Impacted:
--secure=true or >= v3.0 with --secure unspecified (note - running in secure mode is recommended regardless).The Argo Server's keys are packaged within the image. They could be extracted and used to decrypt traffic, or forge requests.
https://github.com/argoproj/argo-workflows/pull/6540
This was identified by engineers at Jetstack.io
{
"severity": "MODERATE",
"github_reviewed_at": "2021-08-23T17:02:24Z",
"cwe_ids": [],
"nvd_published_at": null,
"github_reviewed": true
}