Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xrqc-7xgx-c9vh

Опубликовано: 09 дек. 2025
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

RCE via ZipSlip and symbolic links in argoproj/argo-workflows

Summary

The patch deployed against CVE-2025-62156 is ineffective against malicious archives containing symbolic links.

Details

The untar code that handles symbolic links in archives is unsafe. Concretely, the computation of the link's target and the subsequent check are flawed: https://github.com/argoproj/argo-workflows/blob/5291e0b01f94ba864f96f795bb500f2cfc5ad799/workflow/executor/executor.go#L1034-L1037

PoC

  1. Create a malicious archive containing two files: a symbolik link with path "./work/foo" and target "/etc", and a normal text file with path "./work/foo/hostname".
  2. Deploy a workflow like the one in https://github.com/argoproj/argo-workflows/security/advisories/GHSA-p84v-gxvw-73pf with the malicious archive mounted at /work/tmp.
  3. Submit the workflow and wait for its execution.
  4. Connect to the corresponding pod and observe that the file "/etc/hostname" was altered by the untar operation performed on the malicious archive. The attacker can hence alter arbitrary files in this way.

Impact

The attacker can overwrite the file /var/run/argo/argoexec with a script of their choice, which will be executed at the pod's start.

Пакеты

Наименование

github.com/argoproj/argo-workflows/v3

go
Затронутые версииВерсия исправления

>= 3.7.0, < 3.7.5

3.7.5

Наименование

github.com/argoproj/argo-workflows/v3

go
Затронутые версииВерсия исправления

< 3.6.14

3.6.14

Наименование

github.com/argoproj/argo-workflows

go
Затронутые версииВерсия исправления

<= 2.5.3-rc4

Отсутствует

EPSS

Процентиль: 23%
0.00078
Низкий

8.1 High

CVSS3

Дефекты

CWE-23
CWE-59
CWE-78

Связанные уязвимости

CVSS3: 8.1
nvd
2 месяца назад

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Versions 3.6.13 and below and versions 3.7.0 through 3.7.4, contain unsafe untar code that handles symbolic links in archives. Concretely, the computation of a link's target and the subsequent check are flawed. An attacker can overwrite the file /var/run/argo/argoexec with a script of their choice, which would be executed at the pod's start. The patch deployed against CVE-2025-62156 is ineffective against malicious archives containing symbolic links. This issue is fixed in versions 3.6.14 and 3.7.5.

EPSS

Процентиль: 23%
0.00078
Низкий

8.1 High

CVSS3

Дефекты

CWE-23
CWE-59
CWE-78