Skip to content

Commit 71faa81

Browse files
committed
data/reports: add GO-2024-3268
- data/reports/GO-2024-3268.yaml Fixes #3268 Change-Id: Ibc2c4cfb65aadcf23181459b802bd3ea136785e3 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/635224 Auto-Submit: Tatiana Bradley <[email protected]> Reviewed-by: Zvonimir Pavlinovic <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent 4517b66 commit 71faa81

File tree

2 files changed

+86
-0
lines changed

2 files changed

+86
-0
lines changed

data/osv/GO-2024-3268.json

+58
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-3268",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2022-31668",
8+
"GHSA-r864-28pw-8682"
9+
],
10+
"summary": "Harbor fails to validate the user permissions when updating p2p preheat policies in github.com/goharbor/harbor",
11+
"details": "Harbor fails to validate the user permissions when updating p2p preheat policies. By sending a request to update a p2p preheat policy with an id that belongs to a project that the currently authenticated user doesn't have access to, the attacker could modify p2p preheat policies configured in other projects.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/goharbor/harbor",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "2.0.0+incompatible"
24+
},
25+
{
26+
"fixed": "2.4.3+incompatible"
27+
},
28+
{
29+
"introduced": "2.5.0+incompatible"
30+
},
31+
{
32+
"fixed": "2.5.2+incompatible"
33+
}
34+
]
35+
}
36+
],
37+
"ecosystem_specific": {}
38+
}
39+
],
40+
"references": [
41+
{
42+
"type": "ADVISORY",
43+
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3wpx-625q-22j7"
44+
}
45+
],
46+
"credits": [
47+
{
48+
"name": "Gal Goldstein (Oxeye Security)"
49+
},
50+
{
51+
"name": "Daniel Abeles (Oxeye Security)"
52+
}
53+
],
54+
"database_specific": {
55+
"url": "https://pkg.go.dev/vuln/GO-2024-3268",
56+
"review_status": "REVIEWED"
57+
}
58+
}

data/reports/GO-2024-3268.yaml

+28
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
id: GO-2024-3268
2+
modules:
3+
- module: github.com/goharbor/harbor
4+
versions:
5+
- introduced: 2.0.0+incompatible
6+
- fixed: 2.4.3+incompatible
7+
- introduced: 2.5.0+incompatible
8+
- fixed: 2.5.2+incompatible
9+
vulnerable_at: 2.5.2-rc1+incompatible
10+
summary: Harbor fails to validate the user permissions when updating p2p preheat policies in github.com/goharbor/harbor
11+
description: |-
12+
Harbor fails to validate the user permissions when updating p2p preheat
13+
policies. By sending a request to update a p2p preheat policy with an id that
14+
belongs to a project that the currently authenticated user doesn't have access
15+
to, the attacker could modify p2p preheat policies configured in other projects.
16+
cves:
17+
- CVE-2022-31668
18+
ghsas:
19+
- GHSA-r864-28pw-8682
20+
credits:
21+
- Gal Goldstein (Oxeye Security)
22+
- Daniel Abeles (Oxeye Security)
23+
references:
24+
- advisory: https://github.com/goharbor/harbor/security/advisories/GHSA-3wpx-625q-22j7
25+
source:
26+
id: GHSA-r864-28pw-8682
27+
created: 2024-12-11T16:27:13.919736-05:00
28+
review_status: REVIEWED

0 commit comments

Comments
 (0)