Researchers have discovered a security vulnerability in Harbor cloud native registry. As revealed, a critical bug existed in Harbor container registry that could allow an attacker gain admin user privileges. Though Harbor has patched the flaw, still, hundreds of registries are vulnerable to the attack until updated.
A researcher from Unit 42 Palo Alto Networks found a critical security vulnerability affecting Harbor container registry. Exploiting the bug could allow an adversary to gain admin access to the registries.
As elaborated in a blog post, the privilege escalation vulnerability CVE-2019-16097, allowed an attacker to gain admin access simply by sending a malicious request to the target machine.
Specifically, the attacker could register a new user whilst sending a POST request to “/api/users” that includes user details and
HasAdminRole parameter. As stated in the blog post, doing so is quite simple.
The attacker could then sign-in with this new account to gain admin access. Consequently, the attacker could perform a variety of activities including registering new admin users, downloading and inspecting private projects, and replacing images with malware and crypto miners.