296,663
Total vulnerabilities in the database
An attacker who has permissions to read logs from pods in a namespace with Argo Workflow can read workflow-controller
logs and get credentials to the artifact repository.
An attacker, by reading the logs of the workflow controller pod, can access the artifact repository, and steal, delete or modify the data that resides there. The workflow-controller
logs show the credentials in plaintext.
<img width="1366" alt="screen" src="https://github.com/user-attachments/assets/5642b2be-edcf-4050-bf47-747d05352698" />
An attacker with access to pod logs in the argo
namespace can extract plaintext credentials from the workflow-controller
logs and gain access to the artifact repository. This can lead to:
Software | From | Fixed in |
---|---|---|
![]() |
3.7.0 | 3.7.3 |
![]() |
- | 3.6.12 |