| Vulnerability Name: | CVE-2019-16919 (CCN-169131) | ||||||||||||
| Assigned: | 2019-10-15 | ||||||||||||
| Published: | 2019-10-15 | ||||||||||||
| Updated: | 2020-04-01 | ||||||||||||
| Summary: | Harbor API has a Broken Access Control vulnerability. The vulnerability allows project administrators to use the Harbor API to create a robot account with unauthorized push and/or pull access permissions to a project they don't have access or control for. The Harbor API did not enforce the proper project permissions and project scope on the API request to create a new robot account. | ||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
7.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||
| Vulnerability Type: | CWE-276 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2019-16919 Source: CONFIRM Type: Third Party Advisory http://www.vmware.com/security/advisories/VMSA-2019-0016.html Source: XF Type: UNKNOWN vmware-harbor-cve201916919-priv-esc(169131) Source: MISC Type: Patch, Third Party Advisory https://github.com/goharbor/harbor/security/advisories/GHSA-x2r2-w9c7-h624 Source: MISC Type: Product, Third Party Advisory https://landscape.cncf.io/selected=harbor Source: CCN Type: VMware Security Advisory VMSA-2019-0016 VMware Cloud Foundation and VMware Harbor Container Registry for PCF address broken access control vulnerability (CVE-2019-16919) | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||