Miggo Logo

CVE-2024-47827: Argo Workflows Controller: Denial of Service via malicious daemon Workflows

5.7

CVSS Score
3.1

Basic Information

EPSS Score
0.07686%
Published
10/28/2024
Updated
10/28/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/argoproj/argo-workflows/v3go= 3.6.0-rc13.6.0-rc2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper synchronization around the global 'k8sMetrics' variable. The 'AddMetricsTransportWrapper' function directly modifies the global state (lines 49 and 75 in the original code), while 'RoundTrip' relies on this shared state. The fix introduced a context struct to decouple metrics tracking from the round-tripper instance, eliminating the race. The presence of the original global-based implementation in these functions directly enables the data race described in the CVE.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *u* to * r*** *on*ition in * *lo**l v*ri**l*, t** *r*o work*lows *ontroll*r **n ** m*** to *r*s* on-*omm*n* *y *ny us*r wit* ****ss to *x**ut* * work*low. T*is w*s r*solv** *y *ttps://*it*u*.*om/*r*oproj/*r*o-work*lows/pull/***** ### *

Reasoning

T** vuln*r**ility st*ms *rom improp*r syn**roniz*tion *roun* t** *lo**l 'k*sM*tri*s' v*ri**l*. T** '***M*tri*sTr*nsportWr*pp*r' *un*tion *ir**tly mo*i*i*s t** *lo**l st*t* (lin*s ** *n* ** in t** ori*in*l *o**), w*il* 'Roun*Trip' r*li*s on t*is s**r*