Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h27m-3qw8-3pw8

Опубликовано: 23 июл. 2025
Источник: github
Github: Прошло ревью
CVSS3: 4.9

Описание

Possible ORM Leak Vulnerability in the Harbor

Impact

Administrator users on Harbor could exploit an ORM Leak (https://www.elttam.com/blog/plormbing-your-django-orm/) vulnerability that was present in the /api/v2.0/users endpoint to leak users' password hash and salt values. This vulnerability was introduced into the application because the q URL parameter allowed the administrator to filter users by any column, and the filter password=~ could be abused to leak out a user's password hash character by character.

An attacker with administrator access could exploit this vulnerability to leak highly sensitive information stored on the Harbor database, as demonstrated in the attached writeup by the leaking of users' password hashes and salts. All endpoints that support the q URL parameter are vulnerable to this ORM leak attack, and could potentially be exploitable by lower privileged users to gain unauthorised access to other sensitive information.

Patches

No available

Workarounds

NA

References

Credit

alex@elttam.com

Пакеты

Наименование

github.com/goharbor/harbor

go
Затронутые версииВерсия исправления

= 2.13.0

2.13.1

Наименование

github.com/goharbor/harbor

go
Затронутые версииВерсия исправления

>= 2.4.0-rc1.1, < 2.12.4

2.12.4

Наименование

github.com/goharbor/harbor

go
Затронутые версииВерсия исправления

< 2.4.0-rc1.0.20250331071157-dce7d9f5cffb

2.4.0-rc1.0.20250331071157-dce7d9f5cffb

EPSS

Процентиль: 14%
0.00045
Низкий

4.9 Medium

CVSS3

Дефекты

CWE-200
CWE-202

Связанные уязвимости

CVSS3: 4.9
nvd
7 месяцев назад

CNCF Harbor 2.13.x before 2.13.1 and 2.12.x before 2.12.4 allows information disclosure by administrators who can exploit an ORM Leak present in the /api/v2.0/users endpoint to leak users' password hash and salt values. The q URL parameter allows a user to filter users by any column, and filter password=~ could be abused to leak out a user's password hash character by character. An attacker with administrator access could exploit this to leak highly sensitive information stored in the Harbor database. All endpoints that support the q URL parameter are vulnerable to this ORM leak attack.

EPSS

Процентиль: 14%
0.00045
Низкий

4.9 Medium

CVSS3

Дефекты

CWE-200
CWE-202