VMware Harbor Privilege Escalation (VMSA-2019-0015) (CVE-2019-16097)

medium Nessus Plugin ID 129825

Synopsis

The remote host is affected by a privilege escalation vulnerability.

Description

The remote VMware Harbor cloud native registry is affected by a remote privilege escalation vulnerability. Instances of VMware Harbor with DB as the authentication backend and which allow users to self-register are vulnerable. An authenticated, non-administrator, remote attacker can exploit this by sending a POST request to the '/api/users' API to create a new administrator user account.

Solution

Upgrade to VMware Harbor versions 1.7.6 or later, 1.8.3 or later, or 1.9.0 or later, or apply the workaround in the vendor advisory.

See Also

https://github.com/goharbor/harbor/wiki/Harbor-FAQs#cve-2019-16097

https://www.vmware.com/security/advisories/VMSA-2019-0015.html

Plugin Details

Severity: Medium

ID: 129825

File Name: vmware_harbor_CVE-2019-16097_direct.nasl

Version: 1.6

Type: remote

Family: Misc.

Published: 10/11/2019

Updated: 10/31/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS Score Source: CVE-2019-16097

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:goharbor:harbor

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 9/18/2019

Vulnerability Publication Date: 9/8/2019

Reference Information

CVE: CVE-2019-16097