Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-21652— Argo CD vulnerable to Bypassing of Brute Force Protection via Application Crash and In-Memory Data Loss

CVSS 9.8 · Critical EPSS 0.08% · P23
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-21652

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Argo CD vulnerable to Bypassing of Brute Force Protection via Application Crash and In-Memory Data Loss
Source: NVD (National Vulnerability Database)
Vulnerability Description
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.8.13, 2.9.9, and 2.10.4, an attacker can exploit a chain of vulnerabilities, including a Denial of Service (DoS) flaw and in-memory data storage weakness, to effectively bypass the application's brute force login protection. This is a critical security vulnerability that allows attackers to bypass the brute force login protection mechanism. Not only can they crash the service affecting all users, but they can also make unlimited login attempts, increasing the risk of account compromise. Versions 2.8.13, 2.9.9, and 2.10.4 contain a patch for this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
过多认证尝试的限制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Argo CD 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Argo CD是一个应用软件。用于Kubernetes的声明性GitOps连续交付工具。它持续监控正在运行的应用程序并将当前的实时状态与所需的目标状态(例如 Git 仓库中的配置)进行比较,在 Git 仓库更改时自动同步和部署应用程序。 Argo CD 2.8.13、2.9.9、2.10.4 之前版本存在安全漏洞,该漏洞源于允许攻击者绕过暴力登录保护机制,进行无限制的登录尝试。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
argoprojargo-cd < 2.8.13 -

II. Public POCs for CVE-2024-21652

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-21652

登录查看更多情报信息。

Same Patch Batch · argoproj · 2024-03-18 · 3 CVEs total

CVE-2024-216627.5 HIGHArgo CD vulnerable to Bypassing of Rate Limit and Brute Force Protection Using Cache Overf
CVE-2024-216617.5 HIGHArgo CD Denial of Service (DoS) Vulnerability Due to Unsafe Array Modification in Multi-th

IV. Related Vulnerabilities

V. Comments for CVE-2024-21652

No comments yet


Leave a comment