Improper Privilege Management Affecting github.com/goharbor/harbor/src/common/rbac/project package, versions <2.9.5 >=2.10.0-rc1 <2.10.3 >=2.11.0-rc1 <2.11.0-rc3


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMGOHARBORHARBORSRCCOMMONRBACPROJECT-7577911
  • published 2 Aug 2024
  • disclosed 2 Aug 2024
  • credit Ravid Mazon, Jay Chen

How to fix?

Upgrade github.com/goharbor/harbor/src/common/rbac/project to version 2.9.5, 2.10.3, 2.11.0-rc3 or higher.

Overview

Affected versions of this package are vulnerable to Improper Privilege Management due to improper validation of user permissions during the configuration update process. An attacker can modify project settings by authenticating and sending crafted requests to the server.

Note:

The attacker must be authenticated and granted a specific project maintainer role to modify configurations, limiting their scope to only that project.

References

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
6.9 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    High
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    None
  • Integrity (VI)
    High
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None