Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2019-16097 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical privilege escalation flaw in Harbor's user registration API.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Improper Access Control in `core/api/user.go`. πŸ› **Flaw**: The system fails to validate the `has_admin_role` parameter during user creation, allowing unprivileged users to self-assign admin rights.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Component**: Harbor (Open-source Cloud Native Registry). πŸ“… **Affected Versions**: **1.7.0** through **1.8.2**. βœ… **Safe Versions**: 1.7.6 and 1.8.3+.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Full **Administrator** access. πŸ“‚ **Data Impact**: Can upload malicious container images, compromise client systems pulling these images, and control the entire registry infrastructure.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. 🚫 **Auth Required**: None. βš™οΈ **Config**: Exploits the public registration API endpoint. No prior credentials needed to trigger the vulnerability.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Public Exp?**: **YES**. πŸ“œ **PoCs**: Multiple Python scripts available on GitHub (e.g., `harbor-give-me-admin`, `CVE-2019-16097-batch`). 🌍 **Wild Exploitation**: Active scanning and exploitation tools exist.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Use batch scanning scripts (Python). πŸ“ **Method**: Send POST request with `"has_admin_role": true` to `/api/users`.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fixed?**: **YES**. πŸ“₯ **Patch**: Upgrade to **Harbor v1.7.6** or **v1.8.3**. πŸ”— **Reference**: Official GitHub releases and commits have addressed this access control issue.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: Disable public user registration in Harbor configuration. πŸ›‘ **Mitigation**: Restrict access to the `/api/users` endpoint via WAF or network ACLs if upgrading is delayed.

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **CRITICAL**. 🚨 **Priority**: **P1**. Immediate patching required. The ability to gain admin access without credentials poses an existential threat to container security infrastructure.