In Argo Workflows through 3.1.3, if EXPRESSION_TEMPLATES is enabled and untrusted users are allowed to specify input parameters when running workflows, an attacker may be able to disrupt a workflow because expression template output is evaluated.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1738 In Argo Workflows through 3.1.3, if EXPRESSION_TEMPLATES is enabled and untrusted users are allowed to specify input parameters when running workflows, an attacker may be able to disrupt a workflow because expression template output is evaluated.
Github GHSA Github GHSA GHSA-h563-xh25-x54q Workflow re-write vulnerability using input parameter
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T01:30:09.170Z

Reserved: 2021-08-02T00:00:00

Link: CVE-2021-37914

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-03T00:15:08.607

Modified: 2024-11-21T06:16:02.700

Link: CVE-2021-37914

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses