Vulnerability Report: GO-2022-0388
- GHSA-6c73-2v8x-qpvm
- Affects: github.com/argoproj/argo-workflows, github.com/argoproj/argo-workflows/v2, and 1 more
- Published: Aug 21, 2024
- Unreviewed
Argo Server TLS requests could be forged by attacker with network access in github.com/argoproj/argo-workflows
For detailed information about this vulnerability, visit https://github.com/argoproj/argo-workflows/security/advisories/GHSA-6c73-2v8x-qpvm.
Affected Modules
-
PathGo Versions
-
all versions, no known fixed
-
all versions, no known fixed
-
from v3.0.0 before v3.0.9, from v3.1.0 before v3.1.6
Aliases
References
- https://github.com/argoproj/argo-workflows/security/advisories/GHSA-6c73-2v8x-qpvm
- https://vuln.go.dev/ID/GO-2022-0388.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.