CVE-2020-8828: Insecure Default Initialization of Resource
(updated )
As of v1.5.0, the default admin password is set to the argocd-server pod name. For insiders with access to the cluster or logs, this issue could be abused for privilege escalation, as Argo has privileged roles. A malicious insider is the most realistic threat, but pod names are not meant to be kept secret and could wind up just about anywhere.
References
- argo-cd.readthedocs.io/en/stable/security_considerations/
- argoproj.github.io/argo-cd/security_considerations/
- github.com/advisories/GHSA-h8jc-jmrf-9h8f
- github.com/argoproj/argo-cd/blob/129cf5370f9e2c6f99c9a5515099250a7ba42099/docs/security_considerations.md
- github.com/argoproj/argo/releases
- nvd.nist.gov/vuln/detail/CVE-2020-8828
- www.soluble.ai/blog/argo-cves-2020
Detect and mitigate CVE-2020-8828 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →