Learn about CVE-2021-37914 affecting Argo Workflows versions up to 3.1.3, allowing attackers to disrupt workflows by exploiting expression templates. Find mitigation steps here.
Argo Workflows through version 3.1.3 allows disruption of workflows if EXPRESSION_TEMPLATES is enabled and untrusted users can specify input parameters.
Understanding CVE-2021-37914
This CVE affects Argo Workflows versions up to 3.1.3, enabling attackers to disrupt workflows by exploiting expression templates.
What is CVE-2021-37914?
In Argo Workflows through version 3.1.3, the presence of EXPRESSION_TEMPLATES can empower attackers to disrupt workflows by manipulating output evaluation.
The Impact of CVE-2021-37914
The vulnerability allows untrusted users to interfere with workflow processes, potentially leading to operational disruptions and security breaches.
Technical Details of CVE-2021-37914
Argo Workflows through version 3.1.3 is susceptible to disruption from malicious actors who can abuse EXPRESSION_TEMPLATES.
Vulnerability Description
If untrusted users are permitted to set input parameters in running workflows, attackers can impact workflow execution by exploiting expression template output evaluation.
Affected Systems and Versions
All versions of Argo Workflows up to 3.1.3 are impacted by this vulnerability, especially when EXPRESSION_TEMPLATES is enabled.
Exploitation Mechanism
By allowing untrusted users to define input parameters while running workflows, attackers can disrupt the workflow process through manipulation of expression template output.
Mitigation and Prevention
To safeguard against CVE-2021-37914, immediate actions and long-term security practices are recommended.
Immediate Steps to Take
Disable EXPRESSION_TEMPLATES if not essential and restrict untrusted user access to setting input parameters during workflow runs.
Long-Term Security Practices
Implement stricter access controls, conduct regular security audits, and educate users on safe workflow practices to enhance overall security posture.
Patching and Updates
Stay updated on Argo Workflows releases and apply patches promptly to address vulnerabilities and enhance the security of workflow processes.