First published: Fri Feb 11 2022(Updated: )
# Impact Sean Wright from Secureworks has discovered an enumeration vulnerability. An attacker can make use of the Harbor API to make unauthenticated calls to the Harbor instance. Based on the HTTP status code in the response, an attacker is then able to work out which resources exist, and which do not. This would likely be accomplished by either providing a wordlist or enumerating through a sequence an unauthenticated attacker is able to enumerate resources on the system. This provides them with information such as existing projects, repositories, etc. The vulnerability was immediately fixed by the Harbor team. # Issue The following API resources where found to be vulnerable to enumeration attacks: /api/chartrepo/{repo}/prov (POST) /api/chartrepo/{repo}/charts (GET, POST) /api/chartrepo/{repo}/charts/{name} (GET, DELETE) /api/chartrepo/{repo}/charts/{name}/{version} (GET, DELETE) /api/labels?name={name}&scope=p (GET) /api/repositories?project_id={id} (GET) /api/repositories/{repo_name}/ (GET, PUT, DELETE) /api/repositories/{repo_name}/tags (GET) /api/repositories/{repo_name}/tags/{tag}/manifest?version={version} (GET) /api/repositories/{repo_name/{tag}/labels (GET) /api/projects?project_name={name} (HEAD) /api/projects/{project_id}/summary (GET) /api/projects/{project_id}/logs (GET) /api/projects/{project_id} (GET, PUT, DELETE) /api/projects/{project_id}/metadatas (GET, POST) /api/projects/{project_id}/metadatas/{metadata_name} (GET, PUT) # Known Attack Vectors Successful exploitation of this issue will lead to bad actors identifying which resources exist in Harbor without requiring authentication for the Harbor API. # Patches If your product uses the affected releases of Harbor, update to version 1.10.3 or 2.0.1 to patch this issue immediately. https://github.com/goharbor/harbor/releases/tag/v1.10.3 https://github.com/goharbor/harbor/releases/tag/v2.0.1 # Workarounds There is no known workaround # For more information If you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io View our security policy at https://github.com/goharbor/harbor/security/policy
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Harbor | <1.10.3 | |
Harbor | >=2.0.0<2.0.1 | |
go/github.com/goharbor/harbor | >=2.0.0<2.0.1 | 2.0.1 |
go/github.com/goharbor/harbor | >=1.7.0<1.10.3 | 1.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-19030.
The severity of CVE-2019-19030 is medium with a severity value of 5.3.
Cloud Native Computing Foundation Harbor versions before 1.10.3 and 2.x before 2.0.1 are affected by CVE-2019-19030.
CVE-2019-19030 allows resource enumeration, which means unauthenticated API calls can reveal whether a resource exists.
To fix CVE-2019-19030, update to Harbor version 1.10.3 or higher if using 1.x, or update to version 2.0.1 or higher if using 2.x.