VYPR

Bitnami package

argo-cd

pkg:bitnami/argo-cd

Vulnerabilities (31)

  • CVE-2024-28175Mar 13, 2024
    affected >= 1.0.0, < 2.10.3fixed 2.10.3

    Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Due to the improper URL protocols filtering of links specified in the `link.argocd.argoproj.io` annotations in the application summary component, an attacker can achieve cross-site scripting with elevated p

  • CVE-2023-40584Sep 7, 2023
    affected >= 2.4.0, < 2.6.15fixed 2.6.15

    Argo CD is a declarative continuous deployment for Kubernetes. All versions of ArgoCD starting from v2.4 have a bug where the ArgoCD repo-server component is vulnerable to a Denial-of-Service attack vector. Specifically, the said component extracts a user-controlled tar.gz file w

  • CVE-2023-40029Sep 7, 2023
    affected >= 2.2.0, < 2.6.15fixed 2.6.15

    Argo CD is a declarative continuous deployment for Kubernetes. Argo CD Cluster secrets might be managed declaratively using Argo CD / kubectl apply. As a result, the full secret body is stored in`kubectl.kubernetes.io/last-applied-configuration` annotation. pull request #7139 int

  • CVE-2023-25163Feb 8, 2023
    affected >= 2.6.0, <= 2.6.0

    Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting with v2.6.0-rc1 have an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logge

  • CVE-2021-23135May 12, 2021
    affected >= 1.7.0, < 1.7.14fixed 1.7.14

    Exposure of System Data to an Unauthorized Control Sphere vulnerability in web UI of Argo CD allows attacker to cause leaked secret data into web UI error messages and logs. This issue affects Argo CD 1.8 versions prior to 1.8.7; 1.7 versions prior to 1.7.14.

  • CVE-2021-23347Mar 3, 2021
    affected < 1.7.13fixed 1.7.13

    The package github.com/argoproj/argo-cd/cmd before 1.7.13, from 1.8.0 and before 1.8.6 are vulnerable to Cross-site Scripting (XSS) the SSO provider connected to Argo CD would have to send back a malicious error message containing JavaScript to the user.

  • CVE-2021-26921Feb 9, 2021
    affected < 1.7.12fixed 1.7.12

    In util/session/sessionmanager.go in Argo CD before 1.8.4, tokens continue to work even when the user account is disabled.

  • CVE-2020-8828Apr 8, 2020
    affected < 1.5.0fixed 1.5.0

    As of v1.5.0, the default admin password is set to the argocd-server pod name. For insiders with access to the cluster or logs, this issue could be abused for privilege escalation, as Argo has privileged roles. A malicious insider is the most realistic threat, but pod names are n

  • CVE-2020-8827Apr 8, 2020
    affected < 1.5.0fixed 1.5.0

    As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.

  • CVE-2020-8826Apr 8, 2020
    affected < 1.5.0fixed 1.5.0

    As of v1.5.0, the Argo web interface authentication system issued immutable tokens. Authentication tokens, once issued, were usable forever without expiration—there was no refresh or forced re-authentication.

  • CVE-2020-11576Apr 8, 2020
    affected >= 1.5.0, <= 1.5.0

    Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts because /api/v1/session returned 401 for an existing username and 404 otherwise.

Page 2 of 2