Attack on Kubernetes via Misconfigured Argo Workflows
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          Jul 22, 2021 
          in
          
            argoproj/argo-workflows
          
          •
          Updated Jan 9, 2023 
      
  
Description
        Reviewed
      Jul 22, 2021 
    
  
        Published to the GitHub Advisory Database
      Aug 2, 2021 
    
  
        Last updated
      Jan 9, 2023 
    
  
Impact
Users running using the Argo Server with
--auth-mode=server(which is the default < v3.0.0) AND have exposed their UI to the Internet may allow remote users to execute arbitrary code on their cluster, e.g. crypto-mining.Resolution
--auth-mode=client.For users using an older 2.x version of Argo Server, consider upgrading to Argo Server version 3.x or later.
References