Lucene search

K
cveGitHub_MCVE-2023-45821
HistoryOct 19, 2023 - 9:15 p.m.

CVE-2023-45821

2023-10-1921:15:08
CWE-494
GitHub_M
web.nvd.nist.gov
33
cve
artifact hub
web-based application
cncf projects
security audit
bug
registryisdockerhub function
docker credentials
rate limit
incorrect check
hijack credentials
domain purchase
fake oci registry
security vulnerability
upgrade advisory

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

21.9%

Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub’s code base a security researcher identified a bug in which the registryIsDockerHub function was only checking that the registry domain had the docker.io suffix. Artifact Hub allows providing some Docker credentials that are used to increase the rate limit applied when interacting with the Docker Hub registry API to read publicly available content. Due to the incorrect check described above, it’d be possible to hijack those credentials by purchasing a domain which ends with docker.io and deploying a fake OCI registry on it. <https://artifacthub.io/&gt; uses some credentials that only have permissions to read public content available in the Docker Hub. However, even though credentials for private repositories (disabled on artifacthub.io) are handled in a different way, other Artifact Hub deployments could have been using them for a different purpose. This issue has been resolved in version 1.16.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

Nvd
Vulners
Node
artifacthubhubRange<1.16.0
VendorProductVersionCPE
artifacthubhub*cpe:2.3:a:artifacthub:hub:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "artifacthub",
    "product": "hub",
    "versions": [
      {
        "version": "< 1.16.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

21.9%