Vulnerability Report: GO-2024-3303
- CVE-2024-53862
- Affects: github.com/argoproj/argo-workflows, github.com/argoproj/argo-workflows/v2, and 1 more
- Published: Dec 02, 2024
- Unreviewed
Argo Workflows Allows Access to Archived Workflows with Fake Token in `client` mode in github.com/argoproj/argo-workflows
For detailed information about this vulnerability, visit https://nvd.nist.gov/vuln/detail/CVE-2024-53862.
Affected Modules
-
PathGo Versions
-
all versions, no known fixed
-
all versions, no known fixed
-
from v3.5.7 before v3.5.13, from v3.6.0-rc1 before v3.6.2
Aliases
References
- https://nvd.nist.gov/vuln/detail/CVE-2024-53862
- https://github.com/argoproj/argo-workflows/pull/13021/files#diff-a5b255abaceddc9cc20bf6da6ae92c3a5d3605d94366af503ed754c079a1171aL668-R715
- https://github.com/argoproj/argo-workflows/security/advisories/GHSA-h36c-m3rf-34h9
- https://vuln.go.dev/ID/GO-2024-3303.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.