As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1501 As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.
Github GHSA Github GHSA GHSA-xcqr-9h24-vrgw Improper Restriction of Excessive Authentication Attempts in Argo API
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 07 Aug 2024 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Argoproj
Argoproj argo Cd
CPEs cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:* cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation argo Continuous Delivery
Argoproj
Argoproj argo Cd

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T10:12:10.737Z

Reserved: 2020-02-10T00:00:00

Link: CVE-2020-8827

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-08T20:15:14.700

Modified: 2024-11-21T05:39:31.170

Link: CVE-2020-8827

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.