Harbor API has a Broken Access Control vulnerability. The vulnerability allows project administrators to use the Harbor API to create a robot account with unauthorized push and/or pull access permissions to a project they don't have access or control for. The Harbor API did not enforce the proper project permissions and project scope on the API request to create a new robot account.
References
Link | Resource |
---|---|
http://www.vmware.com/security/advisories/VMSA-2019-0016.html | Third Party Advisory |
https://github.com/goharbor/harbor/security/advisories/GHSA-x2r2-w9c7-h624 | Patch Third Party Advisory |
https://landscape.cncf.io/selected=harbor | Product Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2019-10-18 12:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-16919
Mitre link : CVE-2019-16919
CVE.ORG link : CVE-2019-16919
JSON object : View
Products Affected
vmware
- cloud_foundation
- harbor_container_registry
linuxfoundation
- harbor
CWE
CWE-276
Incorrect Default Permissions