Attack on Kubernetes via Misconfigured Argo Workflows
Moderate severity
GitHub Reviewed
Published
Jul 22, 2021
in
argoproj/argo-workflows
•
Updated Jan 9, 2023
Package
Affected versions
< 3.0.0
Patched versions
None
Description
Reviewed
Jul 22, 2021
Published to the GitHub Advisory Database
Aug 2, 2021
Last updated
Jan 9, 2023
Impact
Users running using the Argo Server with
--auth-mode=server
(which is the default < v3.0.0) AND have exposed their UI to the Internet may allow remote users to execute arbitrary code on their cluster, e.g. crypto-mining.Resolution
--auth-mode=client
.For users using an older 2.x version of Argo Server, consider upgrading to Argo Server version 3.x or later.
References