Harbor API has a Broken Access Control vulnerability. The vulnerability allows project administrators to use the Harbor API to create a robot account with unauthorized push and/or pull access permissions to a project they don't have access or control for. The Harbor API did not enforce the proper project permissions and project scope on the API request to create a new robot account.
References
Link | Resource |
---|---|
https://github.com/goharbor/harbor/security/advisories/GHSA-x2r2-w9c7-h624 | Patch Third Party Advisory |
https://landscape.cncf.io/selected=harbor | Product Third Party Advisory |
http://www.vmware.com/security/advisories/VMSA-2019-0016.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2019-10-18 05:15
Updated : 2020-04-01 08:05
NVD link : CVE-2019-16919
Mitre link : CVE-2019-16919
JSON object : View
CWE
CWE-276
Incorrect Default Permissions
Products Affected
vmware
- cloud_foundation
- harbor_container_registry
linuxfoundation
- harbor