Harbor fails to validate the user permissions when updating a robot account that belongs to a project that the authenticated user doesn’t have access to.
By sending a request that attempts to update a robot account, and specifying a robot account id and robot account name that belongs to a different project that the user doesn’t have access to, it was possible to revoke the robot account permissions.
References
Link | Resource |
---|---|
https://github.com/goharbor/harbor/security/advisories/GHSA-xx9w-464f-7h6f | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
19 Nov 2024, 15:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/goharbor/harbor/security/advisories/GHSA-xx9w-464f-7h6f - Vendor Advisory |
19 Nov 2024, 15:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:* | |
References | () https://github.com/goharbor/harbor/security/advisories/GHSA-xx9w-464f-7h6f - Third Party Advisory | |
CWE | CWE-863 | |
First Time |
Linuxfoundation
Linuxfoundation harbor |
15 Nov 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Nov 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-14 12:15
Updated : 2024-11-19 15:25
NVD link : CVE-2022-31667
Mitre link : CVE-2022-31667
CVE.ORG link : CVE-2022-31667
JSON object : View
Products Affected
linuxfoundation
- harbor