GO-2022-0492

Source
https://pkg.go.dev/vuln/GO-2022-0492
Import Source
https://vuln.go.dev/ID/GO-2022-0492.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2022-0492
Aliases
Published
2022-07-15T23:30:03Z
Modified
2025-01-14T10:57:23.254592Z
Summary
Path traversal in github.com/argoproj/argo-events
Details

GitArtifactReader is vulnerable to directory traversal attacks.

The GitArtifactReader.Read function reads and returns the contents of a Git repository file. A maliciously crafted repository can exploit this to cause Read to read from arbitrary files on the filesystem.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2022-0492"
}
References
Credits
    • Derek Wang

Affected packages

Go / github.com/argoproj/argo-events

Package

Name
github.com/argoproj/argo-events
View open source insights on deps.dev
Purl
pkg:golang/github.com/argoproj/argo-events

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.1

Ecosystem specific

{
    "imports": [
        {
            "symbols": [
                "GetArtifactReader",
                "NewGitReader"
            ],
            "path": "github.com/argoproj/argo-events/sensors/artifacts"
        }
    ]
}