We are not aware of any exploits. This is a pro-active fix.
Impacted:
--secure=true
or >= v3.0 with --secure
unspecified (note - running in secure mode is recommended regardless).The Argo Server's keys are packaged within the image. They could be extracted and used to decrypt traffic, or forge requests.
https://github.com/argoproj/argo-workflows/pull/6540
This was identified by engineers at Jetstack.io
{ "nvd_published_at": null, "cwe_ids": [], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-08-23T17:02:24Z" }