Vulnerability Report: GO-2022-0928
- CVE-2021-37914, GHSA-h563-xh25-x54q
- Affects: github.com/argoproj/argo-workflows, github.com/argoproj/argo-workflows/v2, and 1 more
- Published: Aug 21, 2024
- Unreviewed
Workflow re-write vulnerability using input parameter in github.com/argoproj/argo-workflows
For detailed information about this vulnerability, visit https://github.com/argoproj/argo-workflows/security/advisories/GHSA-h563-xh25-x54q or https://nvd.nist.gov/vuln/detail/CVE-2021-37914.
Affected Modules
-
PathGo Versions
-
all versions, no known fixed
-
all versions, no known fixed
-
from v3.1.0 before v3.1.6
Aliases
References
- https://github.com/argoproj/argo-workflows/security/advisories/GHSA-h563-xh25-x54q
- https://nvd.nist.gov/vuln/detail/CVE-2021-37914
- https://github.com/argoproj/argo-workflows/commit/2a2ecc916925642fd8cb1efd026588e6828f82e1
- https://github.com/argoproj/argo-workflows/pull/6285
- https://github.com/argoproj/argo-workflows/pull/6442
- https://github.com/argoproj/argo-workflows/issues/6441
- https://vuln.go.dev/ID/GO-2022-0928.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.