Show filters
51 Total Results
Displaying 41-50 of 51
Sort by:
Attacker Value
Unknown
CVE-2022-24348
Disclosure Date: February 04, 2022 (last updated August 08, 2024)
Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related to Helm charts because of an error in helmTemplate in repository.go. For example, an attacker may be able to discover credentials stored in a YAML file.
0
Attacker Value
Unknown
CVE-2021-23135
Disclosure Date: March 15, 2021 (last updated February 22, 2025)
Exposure of System Data to an Unauthorized Control Sphere vulnerability in web UI of Argo CD allows attacker to cause leaked secret data into web UI error messages and logs. This issue affects Argo CD 1.8 versions prior to 1.8.7; 1.7 versions prior to 1.7.14.
0
Attacker Value
Unknown
CVE-2021-26923
Disclosure Date: March 15, 2021 (last updated February 22, 2025)
An issue was discovered in Argo CD before 1.8.4. Accessing the endpoint /api/version leaks internal information for the system, and this endpoint is not protected with authentication.
0
Attacker Value
Unknown
CVE-2021-26924
Disclosure Date: March 15, 2021 (last updated February 22, 2025)
An issue was discovered in Argo CD before 1.8.4. Browser XSS protection is not activated due to the missing XSS protection header.
0
Attacker Value
Unknown
CVE-2021-23347
Disclosure Date: March 03, 2021 (last updated February 22, 2025)
The package github.com/argoproj/argo-cd/cmd before 1.7.13, from 1.8.0 and before 1.8.6 are vulnerable to Cross-site Scripting (XSS) the SSO provider connected to Argo CD would have to send back a malicious error message containing JavaScript to the user.
0
Attacker Value
Unknown
CVE-2021-26921
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
In util/session/sessionmanager.go in Argo CD before 1.8.4, tokens continue to work even when the user account is disabled.
0
Attacker Value
Unknown
CVE-2018-21034
Disclosure Date: April 09, 2020 (last updated February 21, 2025)
In Argo versions prior to v1.5.0-rc1, it was possible for authenticated Argo users to submit API calls to retrieve secrets and other manifests which were stored within git.
0
Attacker Value
Unknown
CVE-2020-8828
Disclosure Date: April 08, 2020 (last updated February 21, 2025)
As of v1.5.0, the default admin password is set to the argocd-server pod name. For insiders with access to the cluster or logs, this issue could be abused for privilege escalation, as Argo has privileged roles. A malicious insider is the most realistic threat, but pod names are not meant to be kept secret and could wind up just about anywhere.
0
Attacker Value
Unknown
CVE-2020-8826
Disclosure Date: April 08, 2020 (last updated February 21, 2025)
As of v1.5.0, the Argo web interface authentication system issued immutable tokens. Authentication tokens, once issued, were usable forever without expiration—there was no refresh or forced re-authentication.
0
Attacker Value
Unknown
CVE-2020-8827
Disclosure Date: April 08, 2020 (last updated February 21, 2025)
As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.
0