Affected by GO-2022-0304
and 24 other vulnerabilities
GO-2022-0304 : Path traversal and dereference of symlinks in Argo CD in github.com/argoproj/argo-cd
GO-2022-0357 : Path traversal and improper access control allows leaking out-of-bound files from Argo CD repo-server in github.com/argoproj/argo-cd
GO-2022-0358 : Path traversal allows leaking out-of-bound files from Argo CD repo-server in github.com/argoproj/argo-cd
GO-2022-0359 : Improper access control allows admin privilege escalation in Argo CD in github.com/argoproj/argo-cd
GO-2022-0453 : Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server in github.com/argoproj/argo-cd
GO-2022-0454 : Login screen allows message spoofing if SSO is enabled in github.com/argoproj/argo-cd
GO-2022-0455 : Argo CD will blindly trust JWT claims if anonymous access is enabled in github.com/argoproj/argo-cd
GO-2022-0495 : DoS through large manifest files in Argo CD in github.com/argoproj/argo-cd
GO-2022-0497 : Insecure entropy in Argo CD's PKCE/Oauth2/OIDC params in github.com/argoproj/argo-cd
GO-2022-0498 : Argo CD's external URLs for Deployments can include JavaScript in github.com/argoproj/argo-cd
GO-2022-0499 : Symlink following allows leaking out-of-bounds YAML files from Argo CD repo-server in github.com/argoproj/argo-cd
GO-2022-0516 : Argo CD improper access control bug can allow malicious user to escalate privileges to admin level in github.com/argoproj/argo-cd
GO-2022-0518 : Argo CD certificate verification is skipped for connections to OIDC providers in github.com/argoproj/argo-cd
GO-2023-1520 : JWT audience claim is not verified in github.com/argoproj/argo-cd
GO-2023-1670 : Argo CD authenticated but unauthorized users may enumerate Application names via the API in github.com/argoproj/argo-cd
GO-2023-2085 : Path traversal allows leaking out-of-bound Helm charts from Argo CD repo-server in github.com/argoproj/argo-cd
GO-2024-2646 : Cross-site scripting on application summary component in github.com/argoproj/argo-cd/v2
GO-2024-2792 : Argo CD vulnerable to a Denial of Service via malicious jqPathExpressions in ignoreDifferences in github.com/argoproj/argo-cd
GO-2024-2877 : ArgoCD Vulnerable to Use of Risky or Missing Cryptographic Algorithms in Redis Cache in github.com/argoproj/argo-cd
GO-2024-2898 : Argo-cd authenticated users can enumerate clusters by name in github.com/argoproj/argo-cd
GO-2024-3002 : Argo CD Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint in github.com/argoproj/argo-cd
GO-2025-3433 : Argo CD does not scrub secret values from patch errors in github.com/argoproj/argo-cd
GO-2025-3720 : Argo CD allows cross-site scripting on repositories page in github.com/argoproj/argo-cd
GO-2025-3993 : Unauthenticated argocd-server panic via a malicious Bitbucket-Server webhook payload in github.com/argoproj/argo-cd
GO-2025-3996 : argo-cd vulnerable unauthenticated DoS via malformed Gogs webhook payload in github.com/argoproj/argo-cd
The highest tagged major version is
v3 .
Discover Packages
github.com/argoproj/argo-cd/v2
util
cli
package
Version:
v2.0.1
Opens a new window with list of versions in this module.
Published: Apr 15, 2021
License: Apache-2.0
Opens a new window with license information.
Imports: 22
Opens a new window with list of imports.
Imported by: 27
Opens a new window with list of known importers.
Documentation
Documentation
¶
AddKubectlFlagsToCmd adds kubectl like flags to a command and returns the ClientConfig interface
for retrieving the values.
AskToProceed prompts the user with a message (typically a yes or no question) and returns whether
or not they responded in the affirmative or negative.
InteractiveEdit launches an interactive editor
NewVersionCmd returns a new `version` command to be used as a sub-command to root
PrintDiff prints a diff between two unstructured objects to stdout using an external diff utility
Honors the diff utility set in the KUBECTL_EXTERNAL_DIFF environment variable
PromptCredentials is a helper to prompt the user for a username and password (unless already supplied)
PromptMessage prompts the user for a value (unless already supplied)
PromptPassword prompts the user for a password, without local echo. (unless already supplied)
PromptUsername prompts the user for a username value
ReadAndConfirmPassword is a helper to read and confirm a password from stdin
func SetGLogLevel(glogLevel int )
SetGLogLevel set the glog level for the k8s go-client
func SetLogFormat(logFormat string )
SetLogFormat sets a logrus log format
func SetLogLevel(logLevel string )
SetLogLevel parses and sets a logrus log level
Source Files
¶
Click to show internal directories.
Click to hide internal directories.