Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/argoproj/argo-workflows/v3
  4. ›
  5. GMS-2021-84

GMS-2021-84: Argo Server TLS requests could be forged by attacker with network access

August 23, 2021

Impact

We are not aware of any exploits. This is a pro-active fix.

Impacted:

  • You are running Argo Server < v3.0 with --secure=true or >= v3.0 with --secure unspecified (note - running in secure mode is recommended regardless).
  • The attacker is within your network. If you expose Argo Server to the Internet then “your network” is “the Internet”.

The Argo Server’s keys are packaged within the image. They could be extracted and used to decrypt traffic, or forge requests.

Patches

https://github.com/argoproj/argo-workflows/pull/6540

Workarounds

  • Make sure that your Argo Server service or pod are not directly accessible outside of your cluster. Put TLS load balancer in front of it.

This was identified by engineers at Jetstack.io

References

  • github.com/advisories/GHSA-6c73-2v8x-qpvm
  • github.com/argoproj/argo-workflows/security/advisories/GHSA-6c73-2v8x-qpvm

Code Behaviors & Features

Detect and mitigate GMS-2021-84 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.0.0 before 3.0.9, all versions starting from 3.1.0 before 3.1.6

Fixed versions

  • 3.0.9
  • 3.1.6

Solution

Upgrade to versions 3.0.9, 3.1.6 or above.

Source file

go/github.com/argoproj/argo-workflows/v3/GMS-2021-84.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:04 +0000.