Argo Events is an event-driven workflow automation framework for Kubernetes. Prior to version 1.7.1, several `HandleRoute` endpoints make use of the deprecated `ioutil.ReadAll()`. `ioutil.ReadAll()` reads all the data into memory. As such, an attacker who sends a large request to the Argo Events server will be able to crash it and cause denial of service. A patch for this vulnerability has been released in Argo Events version 1.7.1.
References
Link | Resource |
---|---|
https://github.com/argoproj/argo-events/security/advisories/GHSA-5q86-62xr-3r57 | Third Party Advisory |
https://github.com/argoproj/argo-events/issues/1946 | Issue Tracking Third Party Advisory |
https://github.com/argoproj/argo-events/commit/eaabcb6d65022fc34a0cc9ea7f00681abd326b35 | Patch Third Party Advisory |
https://github.com/argoproj/argo-events/pull/1966 | Patch Third Party Advisory |
Configurations
Information
Published : 2022-06-13 13:15
Updated : 2023-01-10 12:45
NVD link : CVE-2022-31054
Mitre link : CVE-2022-31054
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
argo_events_project
- argo_events