Description
Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts because /api/v1/session returned 401 for an existing username and 404 otherwise.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2593 | Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts because /api/v1/session returned 401 for an existing username and 404 otherwise. |
Github GHSA |
GHSA-vj54-cjrx-x696 | Observable Discrepancy in Argo |
References
History
Wed, 07 Aug 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Argoproj
Argoproj argo Cd |
|
| CPEs | cpe:2.3:a:argoproj:argo_cd:1.5.0:-:*:*:*:*:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation argo Continuous Delivery |
Argoproj
Argoproj argo Cd |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T11:35:13.537Z
Reserved: 2020-04-06T00:00:00.000Z
Link: CVE-2020-11576
No data.
Status : Modified
Published: 2020-04-08T18:15:15.323
Modified: 2024-11-21T04:58:09.787
Link: CVE-2020-11576
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA