As of v1.5.0, the Argo web interface authentication system issued immutable tokens. Authentication tokens, once issued, were usable forever without expiration—there was no refresh or forced re-authentication.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
https://github.com/argoproj/argo/releases | third party advisory |
https://www.soluble.ai/blog/argo-cves-2020 | third party advisory exploit |
https://argoproj.github.io/argo-cd/security_considerations/ | vendor advisory |