CWE
862
Advisory Published
Advisory Published
Updated

CVE-2020-13794

First published: Tue Sep 29 2020(Updated: )

### **Impact** Hidde Smit from Cyber Eagle has discovered an User Enumeration flaw in Harbor. The issue is present in the "/users" api endpoint. This endpoint is supposed to be restricted to administrators. This restriction is able to be bypassed and information can be obtained via the "search" functionality. Non-administrator users (such as those created via self-registration) can list all usernames and user IDs by sending a GET request to /api/users/search with parameter "username" and value "_", as follows: `curl -X GET "https://<host>/api/users/search?username=_" -H "accept: application/json" --user <user>:<password>` The vulnerability was immediately fixed by the Harbor team and all supported versions were patched. With the patched versions of Harbor, the username is required for search and we have removed the support for querying by email. ### **Patches** If your product uses the affected releases of Harbor, update to either version 2.1.0 or 2.0.3 to fix this issue immediately https://github.com/goharbor/harbor/releases/tag/v2.1.0 https://github.com/goharbor/harbor/releases/tag/v2.0.3 ### **Workarounds** There is no workaround for this issue ### **For more information** If you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io View our security policy at https://github.com/goharbor/harbor/security/policy https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13794

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Linuxfoundation Harbor>=1.9.0<2.0.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this security issue?

    The vulnerability ID for this security issue is CVE-2020-13794.

  • What is the impact of CVE-2020-13794?

    CVE-2020-13794 allows exposure of sensitive information to an unauthorized actor.

  • What is the severity of CVE-2020-13794?

    The severity of CVE-2020-13794 is medium, with a severity value of 4.3 out of 10.

  • Which software versions are affected by CVE-2020-13794?

    Harbor versions 1.9.*, 1.10.*, and 2.0.* are affected by CVE-2020-13794.

  • How can I fix CVE-2020-13794?

    To fix CVE-2020-13794, update your Harbor software to version 2.0.3.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203