First published: Sun Sep 08 2019(Updated: )
core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/goharbor/harbor | >=1.7.0<=1.8.9 | 1.9.0-rc1 |
Linuxfoundation Harbor | =1.7.0 | |
Linuxfoundation Harbor | =1.7.0-rc1 | |
Linuxfoundation Harbor | =1.7.0-rc2 | |
Linuxfoundation Harbor | =1.7.1 | |
Linuxfoundation Harbor | =1.7.2 | |
Linuxfoundation Harbor | =1.7.3 | |
Linuxfoundation Harbor | =1.7.4 | |
Linuxfoundation Harbor | =1.7.5 | |
Linuxfoundation Harbor | =1.8.0 | |
Linuxfoundation Harbor | =1.8.0-rc1 | |
Linuxfoundation Harbor | =1.8.0-rc2 | |
Linuxfoundation Harbor | =1.8.1 | |
Linuxfoundation Harbor | =1.8.2 | |
Linuxfoundation Harbor | =1.8.2-rc1 | |
Linuxfoundation Harbor | =1.8.2-rc2 | |
Linuxfoundation Harbor | =1.9.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Harbor vulnerability is CVE-2019-16097.
The severity of CVE-2019-16097 is medium (6.5).
Non-admin users can exploit CVE-2019-16097 in Harbor by creating admin accounts via the POST /api/users API.
Harbor versions 1.7.0 through 1.8.2 are affected by CVE-2019-16097.
To fix CVE-2019-16097 in Harbor, upgrade to one of the fixed versions: v1.7.6, v1.8.3, or v1.9.0.