Argoproj

Argo Cd

56 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.24%
  • Veröffentlicht 09.02.2021 15:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:02

In util/session/sessionmanager.go in Argo CD before 1.8.4, tokens continue to work even when the user account is disabled.

Exploit
  • EPSS 0.88%
  • Veröffentlicht 09.04.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:02:44

In Argo versions prior to v1.5.0-rc1, it was possible for authenticated Argo users to submit API calls to retrieve secrets and other manifests which were stored within git.

Exploit
  • EPSS 0.43%
  • Veröffentlicht 08.04.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:39:31

As of v1.5.0, the default admin password is set to the argocd-server pod name. For insiders with access to the cluster or logs, this issue could be abused for privilege escalation, as Argo has privileged roles. A malicious insider is the most realist...

Exploit
  • EPSS 0.4%
  • Veröffentlicht 08.04.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:39:31

As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.

Exploit
  • EPSS 0.47%
  • Veröffentlicht 08.04.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:39:31

As of v1.5.0, the Argo web interface authentication system issued immutable tokens. Authentication tokens, once issued, were usable forever without expiration—there was no refresh or forced re-authentication.

  • EPSS 0.25%
  • Veröffentlicht 08.04.2020 18:15:15
  • Zuletzt bearbeitet 21.11.2024 04:58:09

Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts because /api/v1/session returned 401 for an existing username and 404 otherwise.