Description
As of v1.5.0, the default admin password is set to the argocd-server pod name. For insiders with access to the cluster or logs, this issue could be abused for privilege escalation, as Argo has privileged roles. A malicious insider is the most realistic threat, but pod names are not meant to be kept secret and could wind up just about anywhere.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1474 | As of v1.5.0, the default admin password is set to the argocd-server pod name. For insiders with access to the cluster or logs, this issue could be abused for privilege escalation, as Argo has privileged roles. A malicious insider is the most realistic threat, but pod names are not meant to be kept secret and could wind up just about anywhere. |
Github GHSA |
GHSA-h8jc-jmrf-9h8f | Argo CD Insecure default administrative password |
References
History
Wed, 07 Aug 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Argoproj
Argoproj argo Cd |
|
| CPEs | cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation argo Continuous Delivery |
Argoproj
Argoproj argo Cd |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T10:12:10.971Z
Reserved: 2020-02-10T00:00:00.000Z
Link: CVE-2020-8828
No data.
Status : Modified
Published: 2020-04-08T20:15:14.763
Modified: 2024-11-21T05:39:31.297
Link: CVE-2020-8828
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA