Non-critical severity vulnerability in Harbor (CVE-2020-29662) #security


Alex Xu
 


Attention Harbor users,
A new Harbor security advisory has been published at https://github.com/goharbor/harbor/security/advisories/GHSA-38r5-34mr-mvm7
The vulnerability has already been fixed in the newly released v2.1.2 and v2.0.5.  Please upgrade to these versions as soon as possible.   If you have any concerns about this timeline, please reach out to us.

 

Description

Javier Provecho, member of the TCCT (Telefonica Cloud & Cybersecurity Tech) SRE team discovered a vulnerability regarding Harbor’s v2 API.

The catalog’s registry v2 api is exposed on an unauthenticated path. The current catalog API path is served at the following path and it requires to be authenticated as an admin.

GET /v2/_catalog

However, the authorization can be bypassed by using the following path

GET /v2/_catalog/


Patches

If your product uses the affected releases of Harbor, update to either version v2.1.2 or v2.0.5 to fix this issue immediately

https://github.com/goharbor/harbor/releases/tag/v2.1.2
https://github.com/goharbor/harbor/releases/tag/v2.0.5


Workarounds
If you cannot access a patched release at this time, it can be mitigated by disabling that API. For example, redirecting it to a 404 sink hole in the ingress.

For more information

If you have any questions or comments about this advisory, contact cncf-harbor-security@...
View our security policy at https://github.com/goharbor/harbor/security/policy
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29662

 

Join harbor-users@lists.cncf.io to automatically receive all group messages.