Description
The package github.com/argoproj/argo-events/sensors/artifacts before 1.7.1 are vulnerable to Directory Traversal in the (g *GitArtifactReader).Read() API in git.go. This could allow arbitrary file reads if the GitArtifactReader is provided a pathname containing a symbolic link or an implicit directory name such as ...
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6135 | The package github.com/argoproj/argo-events/sensors/artifacts before 1.7.1 are vulnerable to Directory Traversal in the (g *GitArtifactReader).Read() API in git.go. This could allow arbitrary file reads if the GitArtifactReader is provided a pathname containing a symbolic link or an implicit directory name such as ... |
Github GHSA |
GHSA-qpgx-64h2-gc3c | Insecure path traversal in Git Trigger Source can lead to arbitrary file read |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T04:24:21.034Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-25856
No data.
Status : Modified
Published: 2022-06-17T20:15:10.607
Modified: 2024-11-21T06:53:07.453
Link: CVE-2022-25856
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA