The package github.com/argoproj/argo-events/sensors/artifacts before 1.7.1 are vulnerable to Directory Traversal in the (g *GitArtifactReader).Read() API in git.go. This could allow arbitrary file reads if the GitArtifactReader is provided a pathname containing a symbolic link or an implicit directory name such as ...
Advisories
Source ID Title
EUVD EUVD EUVD-2022-6135 The package github.com/argoproj/argo-events/sensors/artifacts before 1.7.1 are vulnerable to Directory Traversal in the (g *GitArtifactReader).Read() API in git.go. This could allow arbitrary file reads if the GitArtifactReader is provided a pathname containing a symbolic link or an implicit directory name such as ...
Github GHSA Github GHSA GHSA-qpgx-64h2-gc3c Insecure path traversal in Git Trigger Source can lead to arbitrary file read
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-17T04:24:21.034Z

Reserved: 2022-02-24T00:00:00

Link: CVE-2022-25856

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-17T20:15:10.607

Modified: 2024-11-21T06:53:07.453

Link: CVE-2022-25856

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.