Snyk - Open Source Security

Snyk test report

September 7th 2022, 7:33:58 pm

Scanned the following paths:
  • /private/argo-cd/argoproj/argo-cd/v2 (gomodules)
  • /private/argo-cd (yarn)
2 known vulnerabilities
6 vulnerable dependency paths
1717 dependencies

Improper Input Validation

medium severity

  • Package Manager: golang
  • Vulnerable module: go.mongodb.org/mongo-driver/bson/bsonrw
  • Introduced through: github.com/argoproj/argo-cd/v2@0.0.0, github.com/go-openapi/runtime/middleware@0.19.4 and others

Detailed paths

  • Introduced through: github.com/argoproj/argo-cd/v2@0.0.0 github.com/go-openapi/runtime/middleware@0.19.4 github.com/go-openapi/validate@0.19.5 github.com/go-openapi/strfmt@0.19.3 go.mongodb.org/mongo-driver/bson@1.1.2 go.mongodb.org/mongo-driver/bson/bsonrw@1.1.2
  • Introduced through: github.com/argoproj/argo-cd/v2@0.0.0 github.com/go-openapi/runtime/middleware@0.19.4 github.com/go-openapi/validate@0.19.5 github.com/go-openapi/strfmt@0.19.3 go.mongodb.org/mongo-driver/bson@1.1.2 go.mongodb.org/mongo-driver/bson/bsoncodec@1.1.2 go.mongodb.org/mongo-driver/bson/bsonrw@1.1.2

Overview

go.mongodb.org/mongo-driver/bson/bsonrw is a The MongoDB supported driver for Go.

Affected versions of this package are vulnerable to Improper Input Validation. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshalling Go objects into BSON. A malicious user could use a Go object with specific string to potentially inject additional fields into marshalled documents.

Remediation

Upgrade go.mongodb.org/mongo-driver/bson/bsonrw to version 1.5.1 or higher.

References


Insecure Randomness

medium severity

  • Package Manager: golang
  • Vulnerable module: github.com/Masterminds/goutils
  • Introduced through: github.com/argoproj/argo-cd/v2@0.0.0, github.com/Masterminds/sprig@2.22.0 and others

Detailed paths

  • Introduced through: github.com/argoproj/argo-cd/v2@0.0.0 github.com/Masterminds/sprig@2.22.0 github.com/Masterminds/goutils@1.1.0
  • Introduced through: github.com/argoproj/argo-cd/v2@0.0.0 github.com/argoproj/notifications-engine/pkg/api@#4d8552b0775f github.com/argoproj/notifications-engine/pkg/templates@#4d8552b0775f github.com/Masterminds/sprig@2.22.0 github.com/Masterminds/goutils@1.1.0
  • Introduced through: github.com/argoproj/argo-cd/v2@0.0.0 github.com/argoproj/notifications-engine/pkg/cmd@#4d8552b0775f github.com/argoproj/notifications-engine/pkg/api@#4d8552b0775f github.com/argoproj/notifications-engine/pkg/templates@#4d8552b0775f github.com/Masterminds/sprig@2.22.0 github.com/Masterminds/goutils@1.1.0
  • Introduced through: github.com/argoproj/argo-cd/v2@0.0.0 github.com/argoproj/notifications-engine/pkg/controller@#4d8552b0775f github.com/argoproj/notifications-engine/pkg/api@#4d8552b0775f github.com/argoproj/notifications-engine/pkg/templates@#4d8552b0775f github.com/Masterminds/sprig@2.22.0 github.com/Masterminds/goutils@1.1.0

Overview

github.com/masterminds/goutils is a provides users with utility functions to manipulate strings in various ways.

Affected versions of this package are vulnerable to Insecure Randomness via the RandomAlphaNumeric(int) and CryptoRandomAlphaNumeric(int) functions. Small values of int in the functions above will return a smaller subset of results than they should. For example, RandomAlphaNumeric(1) would always return a digit in the 0-9 range, while RandomAlphaNumeric(4) return around ~7 million of the ~13M possible permutations.

Remediation

Upgrade github.com/masterminds/goutils to version 1.1.1 or higher.

References