Vulnerabilities > CVE-2021-26921 - Insufficient Session Expiration vulnerability in Argoproj Argo CD
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
LOW Integrity impact
LOW Availability impact
NONE Summary
In util/session/sessionmanager.go in Argo CD before 1.8.4, tokens continue to work even when the user account is disabled.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/argoproj/argo-cd/commit/f5b0db240b4e3abf18e97f6fd99096b4f9e94dc5
- https://github.com/argoproj/argo-cd/commit/f5b0db240b4e3abf18e97f6fd99096b4f9e94dc5
- https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4
- https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4
- https://github.com/argoproj/argo-cd/security/advisories/GHSA-9h6w-j7w4-jr52
- https://github.com/argoproj/argo-cd/security/advisories/GHSA-9h6w-j7w4-jr52