Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q9x4-q76f-5h5j

Опубликовано: 11 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

Unauthenticated users can exploit an enumeration vulnerability in Harbor (CVE-2019-19030)

Impact

Sean Wright from Secureworks has discovered an enumeration vulnerability. An attacker can make use of the Harbor API to make unauthenticated calls to the Harbor instance. Based on the HTTP status code in the response, an attacker is then able to work out which resources exist, and which do not. This would likely be accomplished by either providing a wordlist or enumerating through a sequence an unauthenticated attacker is able to enumerate resources on the system. This provides them with information such as existing projects, repositories, etc.

The vulnerability was immediately fixed by the Harbor team.

Issue

The following API resources where found to be vulnerable to enumeration attacks: /api/chartrepo/{repo}/prov (POST) /api/chartrepo/{repo}/charts (GET, POST) /api/chartrepo/{repo}/charts/{name} (GET, DELETE) /api/chartrepo/{repo}/charts/{name}/{version} (GET, DELETE) /api/labels?name={name}&scope=p (GET) /api/repositories?project_id={id} (GET) /api/repositories/{repo_name}/ (GET, PUT, DELETE) /api/repositories/{repo_name}/tags (GET) /api/repositories/{repo_name}/tags/{tag}/manifest?version={version} (GET) /api/repositories/{repo_name/{tag}/labels (GET) /api/projects?project_name={name} (HEAD) /api/projects/{project_id}/summary (GET) /api/projects/{project_id}/logs (GET) /api/projects/{project_id} (GET, PUT, DELETE) /api/projects/{project_id}/metadatas (GET, POST) /api/projects/{project_id}/metadatas/{metadata_name} (GET, PUT)

Known Attack Vectors

Successful exploitation of this issue will lead to bad actors identifying which resources exist in Harbor without requiring authentication for the Harbor API.

Patches

If your product uses the affected releases of Harbor, update to version 1.10.3 or 2.0.1 to patch this issue immediately.

https://github.com/goharbor/harbor/releases/tag/v1.10.3 https://github.com/goharbor/harbor/releases/tag/v2.0.1

Workarounds

There is no known workaround

For more information

If you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io View our security policy at https://github.com/goharbor/harbor/security/policy

Пакеты

Наименование

github.com/goharbor/harbor

go
Затронутые версииВерсия исправления

>= 1.7.0, < 1.10.3

1.10.3

Наименование

github.com/goharbor/harbor

go
Затронутые версииВерсия исправления

>= 2.0.0, < 2.0.1

2.0.1

EPSS

Процентиль: 97%
0.33402
Средний

5.3 Medium

CVSS3

Дефекты

CWE-204

Связанные уязвимости

CVSS3: 5.3
nvd
больше 2 лет назад

Cloud Native Computing Foundation Harbor before 1.10.3 and 2.x before 2.0.1 allows resource enumeration because unauthenticated API calls reveal (via the HTTP status code) whether a resource exists.

EPSS

Процентиль: 97%
0.33402
Средний

5.3 Medium

CVSS3

Дефекты

CWE-204