Affected by GO-2022-0388
and 4 other vulnerabilities
GO-2022-0388: Argo Server TLS requests could be forged by attacker with network access in github.com/argoproj/argo-workflows
GO-2022-0405: Potential privilege escalation on Kubernetes >= v1.19 when the Argo Sever is run with `--auth-mode=client` in github.com/argoproj/argo-workflows
GO-2022-0928: Workflow re-write vulnerability using input parameter in github.com/argoproj/argo-workflows
GO-2024-3226: Argo Workflows Controller: Denial of Service via malicious daemon Workflows in github.com/argoproj/argo-workflows
GO-2024-3303: Argo Workflows Allows Access to Archived Workflows with Fake Token in `client` mode in github.com/argoproj/argo-workflows
Argo is an open source container-native workflow engine for developing and running applications on Kubernetes.
Define workflows where each step in the workflow is a container.
Run rich CI/CD workflows using Docker-in-Docker, complex testing with built in artifact management, secret management and lifecycle management of dev/test resources.
Run compute intensive jobs in a fraction of the time using parallelize workflows.
Build, test and deploy scalable stateful and stateless cloud-native apps and microservices.
Why Argo?
Argo is designed from the ground up for containers without the baggage and limitations of legacy VM and server-based environments.
Argo is cloud agnostic. Today we support AWS and GKE (alpha) with additional platforms coming soon.
Argo with Kubernetes puts a cloud-scale supercomputer at your fingertips.
With Argo, you don’t need to install or learn other tools such as Jenkins, Chef, Cloud Formation...