The Danger of Incomplete Fixes: How a Patched Vulnerability in Argo Workflows Still Allowed Remote Code Execution
Security researchers discovered a critical vulnerability, CVE-2025-66626, in Argo Workflows by analyzing a previous security patch. The patch for an earlier ZipSlip flaw, CVE-2025-62156, intended to prevent path traversal via symlinks during artifact extraction. However, the fix contained a logical flaw: it validated a constructed safe file path but then used the original, attacker-controlled path to create the symbolic link. This mismatch allowed an attacker to craft a tarball that would create symlinks pointing to sensitive locations outside the secure working directory, such as /etc or /tmp, enabling arbitrary file writes. The researchers further demonstrated that this file write primitive could be exploited for full remote code execution by overwriting a specific initialization file executed when a Kubernetes pod starts. The article emphasizes that security patches should be treated as signals for further review, not as conclusive fixes, and warns against over-relying on framework functions for security boundaries.
https://www.endorlabs.com/learn/when-a-broken-fix-leads-to-rce-how-we-found-cve-2025-66626-in-argo
Comments
Post a Comment