Affected by GO-2022-0304
and 26 other vulnerabilities
GO-2022-0304 : Path traversal and dereference of symlinks in Argo CD in github.com/argoproj/argo-cd
GO-2022-0359 : Improper access control allows admin privilege escalation in Argo CD in github.com/argoproj/argo-cd
GO-2022-0387 : Helm OCI credentials leaked into Argo CD logs in github.com/argoproj/argo-cd
GO-2022-0453 : Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server in github.com/argoproj/argo-cd
GO-2022-0454 : Login screen allows message spoofing if SSO is enabled in github.com/argoproj/argo-cd
GO-2022-0455 : Argo CD will blindly trust JWT claims if anonymous access is enabled in github.com/argoproj/argo-cd
GO-2022-0495 : DoS through large manifest files in Argo CD in github.com/argoproj/argo-cd
GO-2022-0497 : Insecure entropy in Argo CD's PKCE/Oauth2/OIDC params in github.com/argoproj/argo-cd
GO-2022-0516 : Argo CD improper access control bug can allow malicious user to escalate privileges to admin level in github.com/argoproj/argo-cd
GO-2022-0517 : Argo CD SSO users vulnerable to Cross-site Scripting in github.com/argoproj/argo-cd
GO-2022-0518 : Argo CD certificate verification is skipped for connections to OIDC providers in github.com/argoproj/argo-cd
GO-2022-0869 : Possible XSS when using SSO with the CLI in github.com/argoproj/argo-cd
GO-2022-0892 : Improper Restriction of Excessive Authentication Attempts in Argo API in github.com/argoproj/argo-cd
GO-2023-1512 : Controller reconciles apps outside configured namespaces when sharding is enabled in github.com/argoproj/argo-cd
GO-2023-1577 : Users with any cluster secret update access may update out-of-bounds cluster secrets in github.com/argoproj/argo-cd
GO-2023-1670 : Argo CD authenticated but unauthorized users may enumerate Application names via the API in github.com/argoproj/argo-cd
GO-2023-1952 : Argo Exposure of Sensitive Information in github.com/argoproj/argo-cd
GO-2023-2018 : Argo CD web terminal session doesn't expire in github.com/argoproj/argo-cd
GO-2023-2049 : Argo CD cluster secret might leak in cluster details page in github.com/argoproj/argo-cd
GO-2023-2050 : Argo CD repo-server Denial of Service vulnerability in github.com/argoproj/argo-cd
GO-2023-2085 : Path traversal allows leaking out-of-bound Helm charts from Argo CD repo-server in github.com/argoproj/argo-cd
GO-2024-2728 : Argo CD's API server does not enforce project sourceNamespaces in github.com/argoproj/argo-cd
GO-2024-2792 : Argo CD vulnerable to a Denial of Service via malicious jqPathExpressions in ignoreDifferences in github.com/argoproj/argo-cd
GO-2024-2877 : ArgoCD Vulnerable to Use of Risky or Missing Cryptographic Algorithms in Redis Cache in github.com/argoproj/argo-cd
GO-2024-2898 : Argo-cd authenticated users can enumerate clusters by name in github.com/argoproj/argo-cd
GO-2024-2902 : Unauthenticated Access to sensitive settings in Argo CD in github.com/argoproj/argo-cd
GO-2024-3006 : The Argo CD web terminal session does not handle the revocation of user permissions properly in github.com/argoproj/argo-cd
The highest tagged major version is
v2 .
Discover Packages
github.com/argoproj/argo-cd
util
git
package
Version:
v1.0.0-rc3
Opens a new window with list of versions in this module.
Published: May 9, 2019
License: Apache-2.0
Opens a new window with license information.
Imports: 14
Opens a new window with list of imports.
Imported by: 158
Opens a new window with list of known importers.
Documentation
Documentation
¶
IsCommitSHA returns whether or not a string is a 40 character SHA-1
IsSSHURL returns true if supplied URL is SSH URL
IsTruncatedCommitSHA returns whether or not a string is a truncated SHA-1
NormalizeGitURL normalizes a git URL for purposes of comparison, as well as preventing redundant
local clones (by normalizing various forms of a URL to a consistent location).
Prefer using SameURL() over this function when possible. This algorithm may change over time
and should not be considered stable from release to release
SameURL returns whether or not the two repository URLs are equivalent in location
TestRepo tests if a repo exists and is accessible with the given credentials
Client is a generic git client interface
type ClientFactory interface {
NewClient(repoURL, path, username, password, sshPrivateKey string , insecureIgnoreHostKey bool ) (Client , error )
}
ClientFactory is a factory of Git Clients
Primarily used to support creation of mock git clients during unit testing
Source Files
¶
Directories
¶
Click to show internal directories.
Click to hide internal directories.