Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Critical Vulnerability Exposes Harbor Registries to Attacks

Harbor registries with default settings are impacted by a vulnerability that allows any user to elevate privileges to administrator, Palo Alto Networks reports.

Harbor registries with default settings are impacted by a vulnerability that allows any user to elevate privileges to administrator, Palo Alto Networks reports.

An open-source cloud native registry that integrates with Docker Hub, Docker Registry, Google Container Registry, and others, Harbor stores, signs and scans container images for vulnerabilities. Users are provided with a simple GUI to download, upload, and scan images.

Tracked as CVE-2019-16097, the vulnerability could allow an attacker to take over Harbor registries via malicious requests. Palo Alto Networks’ security researchers discovered around 1,300 registries that are open to the Internet and which also have default settings, meaning they are at risk.

An attacker exploiting this vulnerability could download private projects and inspect them, delete images in the registry, or even poison the registry by replacing its images with their own.

“The attacker can create a new user and set it to be admin. After that, they can connect to Harbor registry via the Docker command line tool with the new credentials and replace the current images with anything they desire. These can include malware, crypto miners or even worse,” the researchers explain.

The issue, Palo Alto Networks says, resides in one of the available API calls. A user can send a POST request to access the code in charge with the registration of new users. If the request also includes the parameter HasAdminRole set to “True,” which indicates that the user is an admin, then the created user is an admin.

“I wrote a simple Python script that sends a post request to /api/users in order to create a new user with admin privileges, by setting the ‘has_admin_role’ parameter in the request body to True. After running this script, all we need to do is to open Harbor in the browser and just sign in to the user we created,” Palo Alto Networks’ Aviv Sasson explains.

The researcher responsibly disclosed the vulnerability to Harbor, which has already released patches to address it. Harbor versions 1.7.6 and 1.8.3 include the fix, which prevents non-users from creating a new admin user.

Advertisement. Scroll to continue reading.

Affected versions are 1.7.0 – 1.8.2 and all users are advised to update their Harbor installations to prevent others from gaining full access to their registry.

Related: Public Exposure of Sensitive Files on the Internet is Getting Worse

Related: Nexus Repository Flaws Expose Thousands of Private Artifacts

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses.

Register

Join us as we share best practices for uncovering risks and determining next steps when vetting external resources, implementing solutions, and procuring post-installation support.

Register

People on the Move

SSH Communications Security has appointed Pauli Haikonen as the company’s Chief Information Security Officer (CISO).

Cloud and container security firm Sysdig has tapped William Welch as CEO on its path to an IPO.

Dave Scher has been promoted to Deputy Chief Information Officer at MITRE.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.