GHSA-qpgx-64h2-gc3c

Suggest an improvement
Source
https://github.com/advisories/GHSA-qpgx-64h2-gc3c
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-qpgx-64h2-gc3c/GHSA-qpgx-64h2-gc3c.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qpgx-64h2-gc3c
Aliases
Published
2022-06-17T01:03:47Z
Modified
2025-01-14T10:57:23.254592Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Insecure path traversal in Git Trigger Source can lead to arbitrary file read
Details

Impact

A path traversal issue was found in the (g *GitArtifactReader).Read() API. Read() calls into (g *GitArtifactReader).readFromRepository() that opens and reads the file that contains the trigger resource definition:

func (g *GitArtifactReader) readFromRepository(r *git.Repository, dir string)

No checks are made on this file at read time, which could lead an attacker to read files anywhere on the system. This could be achieved by either using symbolic links, or putting ../ in the path.

Patches

A patch for this vulnerability has been released in the following Argo Events version:

v1.7.1

Credits

Disclosed by Ada Logics in a security audit sponsored by CNCF and facilitated by OSTIF.

For more information

Open an issue in the Argo Events issue tracker or discussions Join us on Slack in channel #argo-events

Database specific
{
    "github_reviewed_at": "2022-06-17T01:03:47Z",
    "nvd_published_at": "2022-06-17T20:15:00Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-22"
    ],
    "severity": "HIGH"
}
References

Affected packages

Go / github.com/argoproj/argo-events

Package

Name
github.com/argoproj/argo-events
View open source insights on deps.dev
Purl
pkg:golang/github.com/argoproj/argo-events

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.1