CVE-2023-45821 – github.com/artifacthub/hub
Package
Manager: go
Name: github.com/artifacthub/hub
Vulnerable Version: >=0 <1.16.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00036 pctl0.08819
Details
Artifact Hub has Incorrect Docker Hub registry check ### Impact During a security audit of Artifact Hub's code base, a security researcher at [OffSec](https://www.offsec.com/) identified a bug in which the `registryIsDockerHub` function was only checking that the registry domain had the `docker.io` suffix. Artifact Hub allows providing some Docker credentials that are used to increase the rate limit applied when interacting with the Docker Hub registry API to read publicly available content. Due to the incorrect check described above, it'd be possible to hijack those credentials by purchasing a domain which ends with `docker.io` and deploying a fake OCI registry on it. <https://artifacthub.io/> uses some credentials that only have permissions to read public content available in the Docker Hub. However, even though credentials for private repositories (disabled on `artifacthub.io`) are handled in a different way, other Artifact Hub deployments could have been using them for a different purpose. ### Patches This issue has been resolved in version [1.16.0](https://artifacthub.io/packages/helm/artifact-hub/artifact-hub?modal=changelog&version=1.16.0).
Metadata
Created: 2023-10-19T17:04:50Z
Modified: 2023-10-19T19:35:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-g6pq-x539-7w4j/GHSA-g6pq-x539-7w4j.json
CWE IDs: ["CWE-494"]
Alternative ID: GHSA-g6pq-x539-7w4j
Finding: F086
Auto approve: 1