Affected by GO-2022-0704
and 12 other vulnerabilities
GO-2022-0704 : Unauthenticated users can exploit an enumeration vulnerability in Harbor (CVE-2019-19030) in github.com/goharbor/harbor
GO-2022-0781 : Harbor is vulnerable to a limited Server-Side Request Forgery (SSRF) (CVE-2020-13788) in github.com/goharbor/harbor
GO-2022-0785 : "catalog's registry v2 api exposed on unauthenticated path in Harbor" in github.com/goharbor/harbor
GO-2022-0818 : Missing Authorization in Harbor in github.com/goharbor/harbor
GO-2022-0853 : SQL Injection in Cloud Native Computing Foundation Harbor in github.com/goharbor/harbor
GO-2022-0863 : Privilege Escalation in Cloud Native Computing Foundation Harbor in github.com/goharbor/harbor
GO-2022-0865 : Authenticated users can exploit an enumeration vulnerability in Harbor in github.com/goharbor/harbor
GO-2022-0876 : Cross-site Request Forgery (CSRF) in Cloud Native Computing Foundation Harbor in github.com/goharbor/harbor
GO-2022-0883 : SQL Injection in Cloud Native Computing Foundation Harbor in github.com/goharbor/harbor
GO-2023-2109 : Harbor timing attack risk in github.com/goharbor/harbor
GO-2024-2915 : Open Redirect URL in Harbor in github.com/goharbor/harbor
GO-2024-2916 : SQL Injection in Harbor scan log API in github.com/goharbor/harbor
GO-2024-3013 : Harbor fails to validate the user permissions when updating project configurations in github.com/goharbor/harbor
Discover Packages
github.com/goharbor/harbor
tests
apitests
api-testing
models
package
Version:
v1.8.2-rc1
Opens a new window with list of versions in this module.
Published: Jul 19, 2019
License: Apache-2.0
Opens a new window with license information.
Imports: 0
Opens a new window with list of imports.
Imported by: 32
Opens a new window with list of known importers.
Documentation
Documentation
¶
type Endpoint struct {
Endpoint string `json:"endpoint"`
Name string `json:"name"`
Username string `json:"username"`
Password string `json:"password"`
Type int `json:"type"`
}
Endpoint : For /api/targets
type ExistingMember struct {
MID int `json:"id"`
Name string `json:"entity_name"`
RoleID int `json:"role_id"`
}
ExistingMember : For GET /api/projects/20/members
type ExistingProject struct {
Name string `json:"name"`
ID int `json:"project_id"`
}
ExistingProject : For /api/projects?name=***
type ExistingReplicationPolicy struct {
}
type ExistingUser struct {
User
ID int `json:"user_id"`
}
ExistingUser : For GET /api/users
type Member struct {
RoleID int `json:"role_id"`
Member *MemberUser `json:"member_user"`
}
Member : For /api/projects/:pid/members
type MemberUser struct {
Username string `json:"username"`
}
MemberUser ...
type Metadata struct {
AccessLevel string `json:"public"`
}
Metadata : Metadata for project
type Project struct {
Name string `json:"project_name"`
Metadata *Metadata `json:"metadata,omitempty"`
}
Project : For /api/projects
type ReplicationPolicy struct {
ProjectID int `json:"project_id"`
}
ReplicationPolicy : For /api/replications
type Repository struct {
ID int `json:"id"`
Name string `json:"name"`
}
Repository : For /api/repositories
type ScanOverview struct {
Status string `json:"scan_status"`
}
ScanOverview : For scanning
type SystemInfo struct {
AuthMode string `json:"auth_mode"`
RegistryURL string `json:"registry_url"`
}
SystemInfo : For GET /api/systeminfo
type Tag struct {
Digest string `json:"digest"`
Name string `json:"name"`
Signature map[string ]interface{} `json:"signature, omitempty"`
ScanOverview *ScanOverview `json:"scan_overview, omitempty"`
}
Tag : For /api/repositories/:repo/tags
type User struct {
Username string `json:"username"`
RealName string `json:"realname"`
Password string `json:"password"`
Email string `json:"email"`
}
User : For /api/users
Source Files
¶
Click to show internal directories.
Click to hide internal directories.