mirror of
https://github.com/argoproj/argo-cd
synced 2026-04-21 08:57:17 +00:00
chore: ignore CVE-2022-0624 - not exploitable in Argo CD (#10128)
Signed-off-by: CI <michael@crenshaw.dev>
This commit is contained in:
parent
57a407ecdb
commit
e786ff801e
1 changed files with 8 additions and 0 deletions
8
.snyk
8
.snyk
|
|
@ -28,5 +28,13 @@ ignore:
|
|||
- '*':
|
||||
reason: >-
|
||||
Code is only run client-side. No risk of arbitrary file upload.
|
||||
SNYK-JS-PARSEPATH-2936439:
|
||||
- '*':
|
||||
reason: >-
|
||||
The issue is that, for specific URLs, parse-path may incorrectly identify the "resource" (domain name)
|
||||
portion. For example, in "http://127.0.0.1#@example.com", it identifies "example.com" as the "resource".
|
||||
|
||||
We use parse-path on the client side, but permissions for git URLs are checked server-side. This is a
|
||||
potential usability issue, but it is not a security issue.
|
||||
patch: {}
|
||||
|
||||
|
|
|
|||
Loading…
Reference in a new issue