Vulnerability Description
As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Argoproj | Argo Cd | < 1.5.0 |
Related Weaknesses (CWE)
References
- https://argoproj.github.io/argo-cd/operator-manual/user-management/#disable-admiVendor Advisory
- https://argoproj.github.io/argo-cd/security_considerations/Vendor Advisory
- https://github.com/argoproj/argo/releasesThird Party Advisory
- https://www.soluble.ai/blog/argo-cves-2020ExploitThird Party Advisory
- https://argoproj.github.io/argo-cd/operator-manual/user-management/#disable-admiVendor Advisory
- https://argoproj.github.io/argo-cd/security_considerations/Vendor Advisory
- https://github.com/argoproj/argo/releasesThird Party Advisory
- https://www.soluble.ai/blog/argo-cves-2020ExploitThird Party Advisory
FAQ
What is CVE-2020-8827?
CVE-2020-8827 is a vulnerability with a CVSS score of 7.5 (HIGH). As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentic...
How severe is CVE-2020-8827?
CVE-2020-8827 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-8827?
Check the references section above for vendor advisories and patch information. Affected products include: Argoproj Argo Cd.