Описание
Unauthorized access to Argo Workflows Template
Summary
Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates). Any request with a Authorization: Bearer nothing token can leak sensitive template content, including embedded Secret manifests.
Details
Informers use the server’s rest config, so they read using server SA privileges.
PoC
- Create template
Then apply that with kubectl apply -f poc.yml
2. Query Argo Server with a fake token
Result:
Impact
Any client can leaks Workflow Template and Cluster Workflow Template data, including secrets, artifact locations, service account usage, env vars, and resource manifests.
Ссылки
- https://github.com/argoproj/argo-workflows/security/advisories/GHSA-56px-hm34-xqj5
- https://nvd.nist.gov/vuln/detail/CVE-2026-28229
- https://github.com/argoproj/argo-workflows/commit/34afaf9c0c36f1ba8645d483ea4752cfc4a391e8
- https://github.com/argoproj/argo-workflows/releases/tag/v3.7.11
- https://github.com/argoproj/argo-workflows/releases/tag/v4.0.2
Пакеты
github.com/argoproj/argo-workflows/v3
< 3.7.11
3.7.11
github.com/argoproj/argo-workflows/v4
< 4.0.2
4.0.2
Связанные уязвимости
A flaw was found in Argo Workflows in which an attacker can leak sensitive information contained in Workflow Templates and Cluster Workflow Templates. Because the functions that retrieve template information use server permissions, no authorization is required to read templates which might contain secrets such as passwords, API keys, or other sensitive data.
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates). Any request with a Authorization: Bearer nothing token can leak sensitive template content, including embedded Secret manifests. This vulnerability is fixed in 4.0.2 and 3.7.11.