5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.001 Low
EPSS
Percentile
35.9%
Javier Provecho, member of the TCCT (Telefonica Cloud & Cybersecurity Tech better known as ElevenPaths) SRE team discovered a vulnerability regarding Harbor’s v2 API.
The catalog’s registry v2 api is exposed on an unauthenticated path. The current catalog API path is served at the following path and it requires to be authenticated as an admin.
“GET /v2/_catalog”
However, the authorization can be bypassed by using the following path
“GET /v2/_catalog/”
If your product uses the affected releases of Harbor, update to either version v2.1.2 or v2.0.5 to fix this issue immediately
https://github.com/goharbor/harbor/releases/tag/v2.1.2
https://github.com/goharbor/harbor/releases/tag/v2.0.5
If you cannot access a patched release, it can be mitigated by disabling that API. For example, redirecting it to a 404 sink hole in the ingress.
If you have any questions or comments about this advisory, contact [email protected]
View our security policy at https://github.com/goharbor/harbor/security/policy
https://vulners.com/cve/CVE-2020-29662
CPE | Name | Operator | Version |
---|---|---|---|
github.com/goharbor/harbor | lt | 2.1.2 | |
github.com/goharbor/harbor | lt | 2.0.5 |
github.com/advisories/GHSA-38r5-34mr-mvm7
github.com/goharbor/harbor/commit/3481722f140e1fdf6e6d290b0cd5c86e509feed4
github.com/goharbor/harbor/commit/c7c409a8e5a8b3fd42841dda84759c9d77977853
github.com/goharbor/harbor/pull/13676
github.com/goharbor/harbor/releases/tag/v2.0.5
github.com/goharbor/harbor/releases/tag/v2.1.2
github.com/goharbor/harbor/security/advisories/GHSA-38r5-34mr-mvm7
nvd.nist.gov/vuln/detail/CVE-2020-29662
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.001 Low
EPSS
Percentile
35.9%