Harbor prior to 2.0.1 allows SSRF with this limitation: an attacker with the ability to edit projects can scan ports of hosts accessible on the Harbor server's intranet.
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Link | Tags |
---|---|
https://github.com/goharbor/harbor/releases | third party advisory |
https://www.soluble.ai/blog/harbor-ssrf-cve-2020-13788 | third party advisory exploit |
https://www.youtube.com/watch?v=v8Isqy4yR3Q | third party advisory exploit |