First published: Tue Oct 10 2023(Updated: )
A timing condition in Harbor 2.6.x and below, Harbor 2.7.2 and below, Harbor 2.8.2 and below, and Harbor 1.10.17 and below allows an attacker with network access to create jobs/stop job tasks and retrieve job task information.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Harbor | <1.10.17 | |
Linuxfoundation Harbor | >=2.6.0<=2.6.4 | |
Linuxfoundation Harbor | >=2.7.0<2.7.3 | |
Linuxfoundation Harbor | >=2.8.0<2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-20902.
The severity of CVE-2023-20902 is not specified.
The vulnerability occurs in the Harbor jobservice container due to a comparison of secrets in the authenticator type, which is prone to timing attacks.
To fix CVE-2023-20902, it is recommended to update to the following versions: 2.8.3, 2.7.3, or 1.10.18 of the Harbor package.
More information about CVE-2023-20902 can be found in the GitHub security advisory: [https://github.com/goharbor/harbor/security/advisories/GHSA-mq6f-5xh5-hgcf](https://github.com/goharbor/harbor/security/advisories/GHSA-mq6f-5xh5-hgcf)