CVE-2020-8827

As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.
Configurations

Configuration 1 (hide)

cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () https://argoproj.github.io/argo-cd/operator-manual/user-management/#disable-admin-user - Vendor Advisory () https://argoproj.github.io/argo-cd/operator-manual/user-management/#disable-admin-user - Vendor Advisory
References () https://argoproj.github.io/argo-cd/security_considerations/ - Vendor Advisory () https://argoproj.github.io/argo-cd/security_considerations/ - Vendor Advisory
References () https://github.com/argoproj/argo/releases - Third Party Advisory () https://github.com/argoproj/argo/releases - Third Party Advisory
References () https://www.soluble.ai/blog/argo-cves-2020 - Exploit, Third Party Advisory () https://www.soluble.ai/blog/argo-cves-2020 - Exploit, Third Party Advisory

07 Aug 2024, 15:43

Type Values Removed Values Added
CPE cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:* cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*
First Time Argoproj
Argoproj argo Cd

Information

Published : 2020-04-08 20:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8827

Mitre link : CVE-2020-8827

CVE.ORG link : CVE-2020-8827


JSON object : View

Products Affected

argoproj

  • argo_cd
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts