Description
As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1501 | As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence. |
Github GHSA |
GHSA-xcqr-9h24-vrgw | Improper Restriction of Excessive Authentication Attempts in Argo API |
References
History
Wed, 07 Aug 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Argoproj
Argoproj argo Cd |
|
| CPEs | cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation argo Continuous Delivery |
Argoproj
Argoproj argo Cd |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T10:12:10.737Z
Reserved: 2020-02-10T00:00:00.000Z
Link: CVE-2020-8827
No data.
Status : Modified
Published: 2020-04-08T20:15:14.700
Modified: 2024-11-21T05:39:31.170
Link: CVE-2020-8827
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA