We are not aware of any exploits. This is a pro-active fix.
Impacted:
--secure=true or >= v3.0 with --secure unspecified (note - running in secure mode is recommended regardless).The Argo Server's keys are packaged within the image. They could be extracted and used to decrypt traffic, or forge requests.
https://github.com/argoproj/argo-workflows/pull/6540
This was identified by engineers at Jetstack.io
| Software | From | Fixed in |
|---|---|---|
github.com/argoproj/argo-workflows/v3
|
3.0.0 | 3.0.9 |
github.com/argoproj/argo-workflows/v3
|
3.1.0 | 3.1.6 |