Skip to content

Commit ccfc322

Browse files
committed
data/reports: add GO-2024-2652.yaml
Aliases: CVE-2024-21662, GHSA-2vgg-9h6w-m454, CVE-2024-21652, GHSA-x32m-mvfj-52xv Fixes #2652 Fixes #2651 Change-Id: I833a78df2210cd6fcf5948fdfc77160392f293ea Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/573556 Reviewed-by: Damien Neil <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Run-TryBot: Tim King <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent e8795f2 commit ccfc322

File tree

2 files changed

+140
-0
lines changed

2 files changed

+140
-0
lines changed

data/osv/GO-2024-2652.json

+97
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,97 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2652",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2024-21662",
8+
"CVE-2024-21652",
9+
"GHSA-2vgg-9h6w-m454",
10+
"GHSA-x32m-mvfj-52xv"
11+
],
12+
"summary": "Brute force protection bypass in github.com/argoproj/argo-cd/v2",
13+
"details": "An attacker can effectively bypass the rate limit and brute force protections in Argo CD by exploiting the application's weak cache-based mechanism. The application's brute force protection relies on a cache mechanism that tracks login attempts for each user. An attacker can overflow this cache by bombarding it with login attempts for different users, thereby pushing out the admin account's failed attempts and effectively resetting the rate limit for that account.",
14+
"affected": [
15+
{
16+
"package": {
17+
"name": "github.com/argoproj/argo-cd/v2",
18+
"ecosystem": "Go"
19+
},
20+
"ranges": [
21+
{
22+
"type": "SEMVER",
23+
"events": [
24+
{
25+
"introduced": "0"
26+
},
27+
{
28+
"fixed": "2.8.13"
29+
},
30+
{
31+
"introduced": "2.9.0"
32+
},
33+
{
34+
"fixed": "2.9.9"
35+
},
36+
{
37+
"introduced": "2.10.0"
38+
},
39+
{
40+
"fixed": "2.10.4"
41+
}
42+
]
43+
}
44+
],
45+
"ecosystem_specific": {
46+
"imports": [
47+
{
48+
"path": "github.com/argoproj/argo-cd/v2/util/session",
49+
"symbols": [
50+
"SessionManager.VerifyUsernamePassword",
51+
"SessionManager.updateFailureCount",
52+
"getMaximumCacheSize"
53+
]
54+
}
55+
]
56+
}
57+
}
58+
],
59+
"references": [
60+
{
61+
"type": "FIX",
62+
"url": "https://github.com/argoproj/argo-cd/commit/17b0df1168a4c535f6f37e95f25ed7cd81e1fa4d"
63+
},
64+
{
65+
"type": "FIX",
66+
"url": "https://github.com/argoproj/argo-cd/commit/6e181d72b31522f886a2afa029d5b26d7912ec7b"
67+
},
68+
{
69+
"type": "FIX",
70+
"url": "https://github.com/argoproj/argo-cd/commit/cebb6538f7944c87ca2fecb5d17f8baacc431456"
71+
},
72+
{
73+
"type": "WEB",
74+
"url": "https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8827-insufficient-anti-automationanti-brute-force"
75+
}
76+
],
77+
"credits": [
78+
{
79+
"name": "@nadava669"
80+
},
81+
{
82+
"name": "@pasha-codefresh"
83+
},
84+
{
85+
"name": "@crenshaw-dev"
86+
},
87+
{
88+
"name": "@todaywasawesome"
89+
},
90+
{
91+
"name": "@jannfis"
92+
}
93+
],
94+
"database_specific": {
95+
"url": "https://pkg.go.dev/vuln/GO-2024-2652"
96+
}
97+
}

data/reports/GO-2024-2652.yaml

+43
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
id: GO-2024-2652
2+
modules:
3+
- module: github.com/argoproj/argo-cd/v2
4+
versions:
5+
- fixed: 2.8.13
6+
- introduced: 2.9.0
7+
fixed: 2.9.9
8+
- introduced: 2.10.0
9+
fixed: 2.10.4
10+
vulnerable_at: 2.10.3
11+
packages:
12+
- package: github.com/argoproj/argo-cd/v2/util/session
13+
symbols:
14+
- SessionManager.updateFailureCount
15+
- getMaximumCacheSize
16+
derived_symbols:
17+
- SessionManager.VerifyUsernamePassword
18+
summary: Brute force protection bypass in github.com/argoproj/argo-cd/v2
19+
description: |-
20+
An attacker can effectively bypass the rate limit and brute force protections in
21+
Argo CD by exploiting the application's weak cache-based mechanism. The
22+
application's brute force protection relies on a cache mechanism that tracks
23+
login attempts for each user. An attacker can overflow this cache by bombarding
24+
it with login attempts for different users, thereby pushing out the admin
25+
account's failed attempts and effectively resetting the rate limit for that
26+
account.
27+
cves:
28+
- CVE-2024-21662
29+
- CVE-2024-21652
30+
ghsas:
31+
- GHSA-2vgg-9h6w-m454
32+
- GHSA-x32m-mvfj-52xv
33+
credits:
34+
- '@nadava669'
35+
- '@pasha-codefresh'
36+
- '@crenshaw-dev'
37+
- '@todaywasawesome'
38+
- '@jannfis'
39+
references:
40+
- fix: https://github.com/argoproj/argo-cd/commit/17b0df1168a4c535f6f37e95f25ed7cd81e1fa4d
41+
- fix: https://github.com/argoproj/argo-cd/commit/6e181d72b31522f886a2afa029d5b26d7912ec7b
42+
- fix: https://github.com/argoproj/argo-cd/commit/cebb6538f7944c87ca2fecb5d17f8baacc431456
43+
- web: https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8827-insufficient-anti-automationanti-brute-force

0 commit comments

Comments
 (0)