CVE-2021-37914: Improper Input Validation
(updated )
In Argo Workflows through 3.1.3, if EXPRESSION_TEMPLATES is enabled and untrusted users are allowed to specify input parameters when running workflows, an attacker may be able to disrupt a workflow because expression template output is evaluated.
References
- github.com/advisories/GHSA-h563-xh25-x54q
- github.com/argoproj/argo-workflows/commit/2a2ecc916925642fd8cb1efd026588e6828f82e1
- github.com/argoproj/argo-workflows/issues/6441
- github.com/argoproj/argo-workflows/pull/6285
- github.com/argoproj/argo-workflows/pull/6442
- github.com/argoproj/argo-workflows/security/advisories/GHSA-h563-xh25-x54q
- nvd.nist.gov/vuln/detail/CVE-2021-37914
Detect and mitigate CVE-2021-37914 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →