Authorization bypass vulnerability in Tag Retention Policies
CVE-2022-31670
7.7HIGH
Key Information
- Vendor
- Harbor
- Status
- Harbor
- Vendor
- CVE Published:
- 14 November 2024
Summary
Harbor fails to validate the user permissions when updating tag retention policies.
By sending a request to update a tag retention policy with an id that belongs to a project that the currently authenticated user doesn’t have access to, the attacker could modify tag retention policies configured in other projects.
Affected Version(s)
Harbor = Harbor (Go) 2.x<=2.4.2; 2.5<=2.5.1
Refferences
CVSS V3.1
Score:
7.7
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database