CVE-2022-31054

Argo Events is an event-driven workflow automation framework for Kubernetes. Prior to version 1.7.1, several `HandleRoute` endpoints make use of the deprecated `ioutil.ReadAll()`. `ioutil.ReadAll()` reads all the data into memory. As such, an attacker who sends a large request to the Argo Events server will be able to crash it and cause denial of service. A patch for this vulnerability has been released in Argo Events version 1.7.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:argo_events_project:argo_events:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:03

Type Values Removed Values Added
References () https://github.com/argoproj/argo-events/commit/eaabcb6d65022fc34a0cc9ea7f00681abd326b35 - Patch, Third Party Advisory () https://github.com/argoproj/argo-events/commit/eaabcb6d65022fc34a0cc9ea7f00681abd326b35 - Patch, Third Party Advisory
References () https://github.com/argoproj/argo-events/issues/1946 - Issue Tracking, Third Party Advisory () https://github.com/argoproj/argo-events/issues/1946 - Issue Tracking, Third Party Advisory
References () https://github.com/argoproj/argo-events/pull/1966 - Patch, Third Party Advisory () https://github.com/argoproj/argo-events/pull/1966 - Patch, Third Party Advisory
References () https://github.com/argoproj/argo-events/security/advisories/GHSA-5q86-62xr-3r57 - Third Party Advisory () https://github.com/argoproj/argo-events/security/advisories/GHSA-5q86-62xr-3r57 - Third Party Advisory

Information

Published : 2022-06-13 20:15

Updated : 2024-11-21 07:03


NVD link : CVE-2022-31054

Mitre link : CVE-2022-31054

CVE.ORG link : CVE-2022-31054


JSON object : View

Products Affected

argo_events_project

  • argo_events
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-787

Out-of-bounds Write