Malicious User Access to Job Logs via Unvalidated User Permissions
CVE-2022-31671

7.4HIGH

Key Information:

Vendor
Harbor
Status
Harbor
Vendor
CVE Published:
14 November 2024

Summary

A security vulnerability in Harbor allows authenticated users to bypass authorization measures when accessing job execution logs. Specifically, the flaw arises from Harbor's failure to validate user permissions during the reading and updating of P2P preheat execution logs. By crafting requests that specify various job IDs, malicious users can gain unauthorized access to job logs stored within the Harbor database, potentially exposing sensitive operational information. This risk necessitates immediate attention to ensure robust access control measures are implemented.

Affected Version(s)

Harbor Harbor (Go) 2.x<=2.4.2; 2.5<=2.5.1

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.