Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*", "matchCriteriaId": "F134317F-4296-42B6-8915-32810C62EA1E", "versionEndIncluding": "1.7.6", "versionStartIncluding": "1.7.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*", "matchCriteriaId": "026081A9-A57C-44AA-95CC-2E0A984748DF", "versionEndIncluding": "1.8.5", "versionStartIncluding": "1.8.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:linuxfoundation:harbor:1.9.0:-:*:*:*:*:*:*", "matchCriteriaId": "2AD98173-4AAE-485F-BA41-F0E575EFD6E8", "vulnerable": true}, {"criteria": "cpe:2.3:a:linuxfoundation:harbor:1.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EB9B2E26-AD5F-4B79-A3E1-46355602B4ED", "vulnerable": true}, {"criteria": "cpe:2.3:a:linuxfoundation:harbor:1.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "2C01B4A7-A85B-4057-9923-6AD82CE37C10", "vulnerable": true}, {"criteria": "cpe:2.3:a:linuxfoundation:harbor:1.9.1:-:*:*:*:*:*:*", "matchCriteriaId": "4003793B-3CA7-462C-9B33-8898D4A6CFD4", "vulnerable": true}, {"criteria": "cpe:2.3:a:linuxfoundation:harbor:1.9.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "A8711FA8-827F-4887-BB20-53A4B0E6E9C9", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A User Enumeration flaw exists in Harbor. The issue is present in the \"/users\" API endpoint. This endpoint is supposed to be restricted to administrators. This restriction is able to be bypassed and information can be obtained about registered users can be obtained via the \"search\" functionality."}, {"lang": "es", "value": "Se presenta un fallo de Enumeraci\u00f3n de Usuarios en Harbor. El problema est\u00e1 presente en el endpoint de la API \"/users\". Se supone que este endpoint est\u00e1 restringido a los administradores. Esta restricci\u00f3n puede ser omitida y la informaci\u00f3n puede ser obtenida acerca de los usuarios registrados por medio de la funcionalidad \"search\"."}], "id": "CVE-2019-3990", "lastModified": "2024-11-21T04:43:01.013", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-12-03T17:15:11.727", "references": [{"source": "vulnreport@tenable.com", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-6qj9-33j4-rvhg"}, {"source": "vulnreport@tenable.com", "tags": ["Third Party Advisory"], "url": "https://www.tenable.com/security/research/tra-2019-50"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-6qj9-33j4-rvhg"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.tenable.com/security/research/tra-2019-50"}], "sourceIdentifier": "vulnreport@tenable.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-269"}], "source": "nvd@nist.gov", "type": "Primary"}]}