mirror of
https://github.com/argoproj/argo-cd.git
synced 2026-02-20 01:28:45 +01:00
chore: ignore CVE-2022-0624 - not exploitable in Argo CD (#10128)
Signed-off-by: CI <michael@crenshaw.dev>
This commit is contained in:
8
.snyk
8
.snyk
@@ -28,5 +28,13 @@ ignore:
|
|||||||
- '*':
|
- '*':
|
||||||
reason: >-
|
reason: >-
|
||||||
Code is only run client-side. No risk of arbitrary file upload.
|
Code is only run client-side. No risk of arbitrary file upload.
|
||||||
|
SNYK-JS-PARSEPATH-2936439:
|
||||||
|
- '*':
|
||||||
|
reason: >-
|
||||||
|
The issue is that, for specific URLs, parse-path may incorrectly identify the "resource" (domain name)
|
||||||
|
portion. For example, in "http://127.0.0.1#@example.com", it identifies "example.com" as the "resource".
|
||||||
|
|
||||||
|
We use parse-path on the client side, but permissions for git URLs are checked server-side. This is a
|
||||||
|
potential usability issue, but it is not a security issue.
|
||||||
patch: {}
|
patch: {}
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user