Harbor prior to 2.0.1 allows SSRF with this limitation: an attacker with the ability to edit projects can scan ports of hosts accessible on the Harbor server's intranet.
References
Link | Resource |
---|---|
https://github.com/goharbor/harbor/releases | Third Party Advisory |
https://www.soluble.ai/blog/harbor-ssrf-cve-2020-13788 | Exploit Third Party Advisory |
https://www.youtube.com/watch?v=v8Isqy4yR3Q | Exploit Third Party Advisory |
https://github.com/goharbor/harbor/releases | Third Party Advisory |
https://www.soluble.ai/blog/harbor-ssrf-cve-2020-13788 | Exploit Third Party Advisory |
https://www.youtube.com/watch?v=v8Isqy4yR3Q | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/goharbor/harbor/releases - Third Party Advisory | |
References | () https://www.soluble.ai/blog/harbor-ssrf-cve-2020-13788 - Exploit, Third Party Advisory | |
References | () https://www.youtube.com/watch?v=v8Isqy4yR3Q - Exploit, Third Party Advisory |
Information
Published : 2020-07-15 21:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13788
Mitre link : CVE-2020-13788
CVE.ORG link : CVE-2020-13788
JSON object : View
Products Affected
linuxfoundation
- harbor
CWE
CWE-918
Server-Side Request Forgery (SSRF)