-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/argoproj/argo-events | go | < 1.7.1 | 1.7.1 |
The vulnerability stems from two key issues in git.go: 1) readFromRepository called ioutil.ReadFile without path sanitization or symlink checks, allowing directory traversal. 2) NewGitReader didn't validate() file paths during object creation. The patch added both path pattern validation in NewGitReader and symlink checks in readFromRepository, confirming these were the vulnerable points. The commit diff clearly shows these security checks were missing in the vulnerable versions.
KEV Misses 88% of Exploited CVEs- Get the report