blob: d1b5bdef44bd5fe0f2332aa33a61aa8399fa4566 [file] [log] [blame]
id: GO-2024-3303
modules:
- module: github.com/argoproj/argo-workflows
vulnerable_at: 0.4.7
- module: github.com/argoproj/argo-workflows/v2
vulnerable_at: 2.12.13
- module: github.com/argoproj/argo-workflows/v3
versions:
- introduced: 3.5.7
- fixed: 3.5.13
- introduced: 3.6.0-rc1
- fixed: 3.6.2
vulnerable_at: 3.6.1
summary: |-
Argo Workflows Allows Access to Archived Workflows with Fake Token in `client`
mode in github.com/argoproj/argo-workflows
cves:
- CVE-2024-53862
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-53862
- fix: https://github.com/argoproj/argo-workflows/pull/13021/files#diff-a5b255abaceddc9cc20bf6da6ae92c3a5d3605d94366af503ed754c079a1171aL668-R715
- web: https://github.com/argoproj/argo-workflows/security/advisories/GHSA-h36c-m3rf-34h9
source:
id: CVE-2024-53862
created: 2024-12-02T14:56:09.920859-05:00
review_status: UNREVIEWED