First published: Thu Nov 14 2024(Updated: )
Harbor fails to validate the user permissions when updating p2p preheat policies. By sending a request to update a p2p preheat policy with an id that belongs to a project that the currently authenticated user doesn't have access to, the attacker could modify p2p preheat policies configured in other projects.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/goharbor/harbor/src | <0.0.0-20220630175814-b4ef1db | 0.0.0-20220630175814-b4ef1db |
go/github.com/goharbor/harbor | >=2.5.0<2.5.2 | 2.5.2 |
go/github.com/goharbor/harbor | >=2.0.0<2.4.3 | 2.4.3 |
Harbor | >=2.0.0<2.4.3 | |
Harbor | >=2.5.0<2.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31668 is a critical vulnerability that allows unauthorized modification of p2p preheat policies.
To fix CVE-2022-31668, upgrade to a version of Harbor that is greater than 2.5.2 or apply the recommended patches.
CVE-2022-31668 affects Harbor versions prior to 2.4.3 and 2.5.2.
CVE-2022-31668 is an access control vulnerability that fails to validate user permissions.
An attacker with access to update p2p preheat policies can exploit CVE-2022-31668 if they target projects they shouldn't have access to.