You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. When using --auth-mode=client, Archived Workflows can be retrieved with a fake or spoofed token via the GET Workflow endpoint: /api/v1/workflows/{namespace}/{name} or when using --auth-mode=sso, all Archived Workflows can be retrieved with a valid token via the GET Workflow endpoint: /api/v1/workflows/{namespace}/{name}. No authentication is performed by the Server itself on client tokens. Authentication & authorization is instead delegated to the k8s API server. However, ...
Advisory CVE-2024-53862 references a vulnerability in the following Go modules:
Description:
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. When using
--auth-mode=client
, Archived Workflows can be retrieved with a fake or spoofed token via the GET Workflow endpoint:/api/v1/workflows/{namespace}/{name}
or when using--auth-mode=sso
, all Archived Workflows can be retrieved with a valid token via the GET Workflow endpoint:/api/v1/workflows/{namespace}/{name}
. No authentication is performed by the Server itself onclient
tokens. Authentication & authorization is instead delegated to the k8s API server. However, ...References:
Cross references:
See doc/quickstart.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: