Insecure path traversal in Git Trigger Source can lead to arbitrary file read
Package
Affected versions
< 1.7.1
Patched versions
1.7.1
Description
Published to the GitHub Advisory Database
Jun 17, 2022
Reviewed
Jun 17, 2022
Published by the National Vulnerability Database
Jun 17, 2022
Last updated
Aug 28, 2023
Impact
A path traversal issue was found in the
(g *GitArtifactReader).Read() API. Read()
calls into(g *GitArtifactReader).readFromRepository()
that opens and reads the file that contains the trigger resource definition:No checks are made on this file at read time, which could lead an attacker to read files anywhere on the system. This could be achieved by either using symbolic links, or putting
../
in the path.Patches
A patch for this vulnerability has been released in the following Argo Events version:
v1.7.1
Credits
Disclosed by Ada Logics in a security audit sponsored by CNCF and facilitated by OSTIF.
For more information
Open an issue in the Argo Events issue tracker or discussions
Join us on Slack in channel #argo-events
References