-
Notifications
You must be signed in to change notification settings - Fork 0
Update module github.com/argoproj/argo-cd/v2 to v2.13.8 [SECURITY] #166
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Update module github.com/argoproj/argo-cd/v2 to v2.13.8 [SECURITY] #166
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
39fcd97
to
b1c5fc9
Compare
e053e89
to
b1c5fc9
Compare
baee4d7
to
b1c5fc9
Compare
d217627
to
b1c5fc9
Compare
7766848
to
b1c5fc9
Compare
9ac0d81
to
b1c5fc9
Compare
4dc406b
to
b1c5fc9
Compare
ff763b8
to
b1c5fc9
Compare
d8dc0af
to
b1c5fc9
Compare
20e8f2c
to
b1c5fc9
Compare
093e089
to
b1c5fc9
Compare
b1c5fc9
to
8cd09d6
Compare
|
This PR contains the following updates:
v2.12.0
->v2.13.8
GitHub Vulnerability Alerts
CVE-2025-23216
Impact
A vulnerability was discovered in Argo CD that exposed secret values in error messages and the diff view when an invalid Kubernetes Secret resource was synced from a repository.
The vulnerability assumes the user has write access to the repository and can exploit it, either intentionally or unintentionally, by committing an invalid Secret to repository and triggering a Sync. Once exploited, any user with read access to Argo CD can view the exposed secret data.
Patches
A patch for this vulnerability is available in the following Argo CD versions:
Workarounds
There is no workaround other than upgrading.
References
Fixed with commit argoproj/argo-cd@6f5537b & argoproj/gitops-engine@7e21b91
CVE-2025-47933
Impact
This vulnerability allows an attacker to perform arbitrary actions on behalf of the victim via the API, such as creating, modifying, and deleting Kubernetes resources. Due to the improper filtering of URL protocols in the repository page, an attacker can achieve cross-site scripting with permission to edit the repository.
In
ui/src/app/shared/components/urls.ts
, the following code exists to parse the repository URL.https://github.com/argoproj/argo-cd/blob/0ae5882d5ae9fe88efc51f65ca8543fb8c3a0aa1/ui/src/app/shared/components/urls.ts#L14-L26
Since this code doesn't validate the protocol of repository URLs, it's possible to inject
javascript:
URLs here.https://github.com/argoproj/argo-cd/blob/0ae5882d5ae9fe88efc51f65ca8543fb8c3a0aa1/ui/src/app/shared/components/repo.tsx#L5-L7
As the return value of this function is used in the
href
attribute of thea
tag, it's possible to achieve cross-site scripting by usingjavascript:
URLs.Browsers may return the proper hostname for
javascript:
URLs, allowing exploitation of this vulnerability.Patches
A patch for this vulnerability has been released in the following Argo CD versions:
The patch incorporates a way to validate the URL being passed in. Returning
null
if the validation fails.Workarounds
There are no workarounds other than depending on the browser to filter the URL.
Credits
Disclosed by @Ry0taK RyotaK.
For more information
Open an issue in the Argo CD issue tracker or discussions
Join us on Slack in channel #argo-cd
Release Notes
argoproj/argo-cd (github.com/argoproj/argo-cd/v2)
v2.13.8
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
This release fixes a critical security issue: GHSA-2hj5-g64g-fp6p
Bug fixes
97fd4ac
: fix(appset): generated app errors should use the default requeue (#21887) (cherry-pick #21936) (#22673) (@gcp-cherry-pick-bot[bot])41ab259
: fix(test): broken e2e test (cherry-pick #22975) (#23053) (@gcp-cherry-pick-bot[bot])Other work
d508e3b
: Merge commit from fork (@crenshaw-dev)6612b7b
: chore: replace heptio-images with argocd-e2e-container (cherry-pick #23040) (#23056) (@nitishfy)Full Changelog: argoproj/argo-cd@v2.13.7...v2.13.8
v2.13.7
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Bug fixes
0f65a3f
: fix(cli): wrong variable to store --no-proxy value (cherry-pick #21226) (#22591) (@gcp-cherry-pick-bot[bot])bb70a1f
: fix: Check placement exists before length check (#22060) (#22057) (#22505) (@aali309)Dependency updates
4b11800
: chore(deps): update github.com/expr-lang/expr to v1.17.0 (#22610) (@aali309)fb5624c
: chore(deps): update go-jose library from 4.0.2 to 4.0.5 (#22560) (@aali309)Full Changelog: argoproj/argo-cd@v2.13.6...v2.13.7
v2.13.6
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Bug fixes
43f3cff
: fix(ci): use pinned Helm version for init-release (#22164) (#22472) (@crenshaw-dev)17a535f
: fix(server): Fix server crash due to race condition in go-redis triggered by DNS instability (#22251) (@anandf)3875dde
: fix: CVE-2025-26791 upgrading redoc dep to 2.4.0, DOMPurify before 3.2.4 (#21966) (@nmirasch)6ef7f61
: fix: correct lookup for the kustomization file when applying patches (cherry-pick #22024) (#22087) (@nitishfy)c7937f1
: fix: correctly set compareWith when requesting app refresh with delay (fixes #18998) (cherry-pick #21298) (#21953) (@gcp-cherry-pick-bot[bot])6207fd0
: fix: handle annotated git tags correctly in repo server cache (#21771) (#22397) (@aali309)Dependency updates
58ded15
: chore(deps): bump github.com/golang-jwt/jwt to 4.5.2 (#22466) (@crenshaw-dev)Other work
8d02798
: chore: Update change log for 2.13.6 (#22438) (@keithchong)180d689
: chore: cherry-pick #21786 for v2.13 (#21906) (@nitishfy)Full Changelog: argoproj/argo-cd@v2.13.5...v2.13.6
v2.13.5
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Bug fixes
49771c1
: fix(ui): Solve issue with navigating with dropdown from an application's page (cherry-pick #21737) (#21747) (@gcp-cherry-pick-bot[bot])c6112c0
: fix: Add proxy registry key by dest server + name (cherry-pick #21791) (#21793) (@gcp-cherry-pick-bot[bot])Full Changelog: argoproj/argo-cd@v2.13.4...v2.13.5
v2.13.4
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Bug fixes
2fe4536
: fix(appset): events not honouring configured namespaces (#21219) (#21241) (#21520) (@eadred)99aaf43
: fix: Policy/policy.open-cluster-management.io stuck in progressing status when no clusters match the policy (#21296) (cherry-pick #21297) (#21594) (@gcp-cherry-pick-bot[bot])2618ccc
: fix: login return_url doesn't work with custom server paths (cherry-pick #21588) (#21603) (@gcp-cherry-pick-bot[bot])53dc116
: fix: oras-go client should fallback to docker config if no credentials specified (cherry-pick 2.13 #18133) (#20872) (@eestolano)fd67e49
: fix: resolve the failing e2e appset tests for ksonnet applications (cherry-pick #21580) (#21605) (@gcp-cherry-pick-bot[bot])Documentation
c0f847f
: docs: Update Screenshot in Orphaned Resources Monitoring Section #20510 (cherry-pick #20533) (#21489) (@gcp-cherry-pick-bot[bot])c8a62bb
: docs: add mkdocs configuration stanza to .readthedocs.yaml (cherry-pick #21475) (#21609) (@gcp-cherry-pick-bot[bot])Dependency updates
2e794fb
: chore(deps): bump github.com/go-git/go-git/v5 from 5.12.0 to 5.13.0 (cherry-pick #21329) (#21401) (@gcp-cherry-pick-bot[bot])38e02ab
: chore(deps): bump go-git version to go-git/v5 5.13.1 (#21551) (@aali309)Other work
49163b0
: Fix application url for custom base href (#21377) (#21515) (@gcp-cherry-pick-bot[bot])10b9589
: Merge commit from fork (@svghadi)Full Changelog: argoproj/argo-cd@v2.13.3...v2.13.4
v2.13.3
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Bug fixes
f260510
: fix(api): send to closed channel in mergeLogStreams (#7006) (#21178) (#21187) (@gcp-cherry-pick-bot[bot])09eede0
: fix(appset): Fix appset generate in --core mode for cluster gen (#21170) (#21236) (@gcp-cherry-pick-bot[bot])64a14a0
: fix(ui): add optional check to avoid undefined reference in project detail (#20044) (#21263) (@crenshaw-dev)c76a131
: fix: Change applicationset generate HTTP method to avoid route conflicts (#20758) (#21300) (@gcp-cherry-pick-bot[bot])079754c
: fix: Populate destination name when destination server is specified (#21063) (cherry-pick 2.13) (#21176) (@adriananeci)Full Changelog: argoproj/argo-cd@v2.13.2...v2.13.3
v2.13.2
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Bug fixes
ad36916
: fix(cli): Fix appset generate in --core mode (#20717) (#20883) (@gcp-cherry-pick-bot[bot])01ae20d
: fix: 20791 - sync multi-source application out of order source syncs (cherry-pick #21071) (#21077) (@gcp-cherry-pick-bot[bot])831e452
: fix: API server should not attempt to read secrets in all namespaces (#20950) (#20960) (@gcp-cherry-pick-bot[bot])a3624a3
: fix: Allow to delete repos with invalid urls (#20921) (#20975) (#21116) (@gcp-cherry-pick-bot[bot])89ef356
: fix: Bitbucket Cloud PR Author is processed correctly (#20769) (#20990) (#21039) (@gcp-cherry-pick-bot[bot])f8d6665
: fix: Memory leak in repo-server (#20876) (#20894) (@gcp-cherry-pick-bot[bot])b6af657
: fix: add missing fields in listrepositories (#20991) (#21129) (@blakepettersson)Dependency updates
0680ddb
: chore(deps): bump http-proxy-middleware from 2.0.4 to 2.0.7 in /ui (#20518) (#20892) (@gcp-cherry-pick-bot[bot])Full Changelog: argoproj/argo-cd@v2.13.1...v2.13.2
v2.13.1
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Features
6a8cb6e
: feat: option to disable writing k8s events(#18205) (#18441) (#20788) (@Jack-R-lantern)Bug fixes
449e693
: fix(pkce): 20202 Backport PKCE auth flow fix for basehref and reauth (#20675) (@austin5219)68606c6
: fix: Fix repeated 403 due to app namespace being undefined (#20699) (#20819) (#20860) (@gcp-cherry-pick-bot[bot])99aab9a
: fix: check for source position when --show-params is set (#20682) (#20689) (@gcp-cherry-pick-bot[bot])d03ccf3
: fix: disable automaxprocs logging (#20069) - cherry-pick 2.13 (#20718) (@pasha-codefresh)Other work
7f45c9e
: chore: Don't degrade PDB on InsufficientPods (#20171) (#20665) (#20694) (@gcp-cherry-pick-bot[bot])Full Changelog: argoproj/argo-cd@v2.13.0...v2.13.1
v2.13.0
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Features
e3b1d93
: feat: allow individual extension configs (#20491) (#20525) (@leoluz)2503eb3
: feat: support using exponential backoff between self heal attempts (#20275) (#20480) (@alexmt)Bug fixes
deb07ee
: fix(appset): avoid panic when no steps in rollingSync (#20357) (#20492) (@gcp-cherry-pick-bot[bot])e7f9881
: fix(diff): avoid cache miss in server-side diff (#20605) (#20607) (@gcp-cherry-pick-bot[bot])7bc333d
: fix(ui): fix open application detail in new tab when basehref is set (#20004) (#20571) (@amit-o)1fcbe3f
: fix(ui): fix the slider tansition (#20641) (#20642) (@gcp-cherry-pick-bot[bot])be57dfe
: fix: support managing cluster with multiple argocd instances and annotation based tracking (#20222) (#20483) (@alexmt)435989c
: fix: support managing cluster with multiple argocd instances and annotation based tracking (#20222) (#20488) (@alexmt)Documentation
d417417
: docs(rbac): clarify glob pattern behavior for fine-grain RBAC (#20624) (#20626) (@gcp-cherry-pick-bot[bot])Other work
3f708b8
: rerender when extensions update (#20559) (#20601) (@gcp-cherry-pick-bot[bot])Full Changelog: argoproj/argo-cd@v2.13.0-rc5...v2.13.0
v2.12.12
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Bug fixes
9f6924b
: fix: fixing back cherry-pick commit for #20222 (#22634) (@alexmt)Full Changelog: argoproj/argo-cd@v2.12.11...v2.12.12
v2.12.11
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Bug fixes
7400d14
: fix(ci): use pinned Helm version for init-release (#22164) (#22473) (@crenshaw-dev)44c36b8
: fix: CVE-2025-26791 upgrading redoc dep to 2.4.0 to avoid DOMPurify b… (#21994) (@nmirasch)61a1c74
: fix: correctly set compareWith when requesting app refresh with delay (fixes #18998) (cherry-pick #21298) (#21954) (@gcp-cherry-pick-bot[bot])Dependency updates
59f23e2
: chore(deps): bump github.com/golang-jwt/jwt to 4.5.2 (#22467) (@crenshaw-dev)Full Changelog: argoproj/argo-cd@v2.12.10...v2.12.11
v2.12.10
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Bug fixes
c26ee69
: fix(appset): events not honouring configured namespaces (#21219) (#21241) (#21521) (@eadred)4ba830f
: fix: resolve the failing e2e appset tests for ksonnet applications (cherry-pick #21580) (#21606) (@gcp-cherry-pick-bot[bot])Documentation
84ace16
: docs: add mkdocs configuration stanza to .readthedocs.yaml (cherry-pick #21475) (#21610) (@gcp-cherry-pick-bot[bot])Dependency updates
b6e1080
: chore(deps): bump go-git version to go-git/v5 5.13.1 (#21550) (@aali309)Other work
a9d8027
: Merge commit from fork (@svghadi)Full Changelog: argoproj/argo-cd@v2.12.9...v2.12.10
v2.12.9
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Bug fixes
041133a
: fix(api): send to closed channel in mergeLogStreams (#7006) (#21178) (#21188) (@gcp-cherry-pick-bot[bot])6934ace
: fix: CVE-2024-21538 upgrading the indirect dependency cross-spawn to 7.0.5 (#21156) (@nmirasch)Full Changelog: argoproj/argo-cd@v2.12.8...v2.12.9
v2.12.8
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Bug fixes
05c1dd7
: fix: 20791 - sync multi-source application out of order source syncs (cherry-pick #21071) (#21078) (@gcp-cherry-pick-bot[bot])60d0786
: fix: Allow to delete repos with invalid urls (#20921) (#20975) (#21117) (@gcp-cherry-pick-bot[bot])7642db8
: fix: add missing fields in listrepositories (#20991) (#21128) (@blakepettersson)Dependency updates
b32d50d
: chore(deps): bump http-proxy-middleware from 2.0.4 to 2.0.7 in /ui (#20518) (#20891) (@gcp-cherry-pick-bot[bot])Other work
57cef1d
: Add missing 2.12 upgrade to nav menu (#20657) (@fletch3555)Full Changelog: argoproj/argo-cd@v2.12.7...v2.12.8
v2.12.7
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Features
db5876f
: feat: support using exponential backoff between self heal attempts (#20275) (#20479) (@alexmt)Bug fixes
e48878b
: fix(diff): avoid cache miss in server-side diff (#20605) (#20609) (@gcp-cherry-pick-bot[bot])a41f868
: fix(ui): fix create app panel reappear after closed (#19717) (#20507) (@gcp-cherry-pick-bot[bot])cacb06a
: fix: check err before use schedule and duration (#20043) (#20371) (@daengdaengLee)32ef2e5
: fix: support managing cluster with multiple argocd instances and annotation based tracking (#20222) (#20482) (@alexmt)Documentation
0cae929
: docs(rbac): clarify glob pattern behavior for fine-grain RBAC (#20624) (#20627) (@gcp-cherry-pick-bot[bot])Full Changelog: argoproj/argo-cd@v2.12.6...v2.12.7
v2.12.6
Compare Source
Quick Start
Non-HA:
HA:
Release Signatures and Provenance
All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.
Upgrading
If upgrading from a different minor version, be sure to read the upgrading documentation.
Changelog
Bug fixes
68f63e7
: fix(diff): avoid cache miss in server-side diff (#20423) (#20424) (#20450) (@gcp-cherry-pick-bot[bot])358930b
: fix: don't disable buttons for multi-source apps (#20446) (#20448) (@gcp-cherry-pick-bot[bot])Full Changelog: argoproj/argo-cd@v2.12.5...v2.12.6
v2.12.5
Compare Source
Quick Start
Non-HA: