{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T07:41:50.987","vulnerabilities":[{"cve":{"id":"CVE-2019-3990","sourceIdentifier":"vulnreport@tenable.com","published":"2019-12-03T17:15:11.727","lastModified":"2024-11-21T04:43:01.013","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A User Enumeration flaw exists in Harbor. The issue is present in the \"/users\" API endpoint. This endpoint is supposed to be restricted to administrators. This restriction is able to be bypassed and information can be obtained about registered users can be obtained via the \"search\" functionality."},{"lang":"es","value":"Se presenta un fallo de Enumeración de Usuarios en Harbor. El problema está presente en el endpoint de la API \"/users\". Se supone que este endpoint está restringido a los administradores. Esta restricción puede ser omitida y la información puede ser obtenida acerca de los usuarios registrados por medio de la funcionalidad \"search\"."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*","versionStartIncluding":"1.7.0","versionEndIncluding":"1.7.6","matchCriteriaId":"F134317F-4296-42B6-8915-32810C62EA1E"},{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*","versionStartIncluding":"1.8.0","versionEndIncluding":"1.8.5","matchCriteriaId":"026081A9-A57C-44AA-95CC-2E0A984748DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:harbor:1.9.0:-:*:*:*:*:*:*","matchCriteriaId":"2AD98173-4AAE-485F-BA41-F0E575EFD6E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:harbor:1.9.0:rc1:*:*:*:*:*:*","matchCriteriaId":"EB9B2E26-AD5F-4B79-A3E1-46355602B4ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:harbor:1.9.0:rc2:*:*:*:*:*:*","matchCriteriaId":"2C01B4A7-A85B-4057-9923-6AD82CE37C10"},{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:harbor:1.9.1:-:*:*:*:*:*:*","matchCriteriaId":"4003793B-3CA7-462C-9B33-8898D4A6CFD4"},{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:harbor:1.9.1:rc1:*:*:*:*:*:*","matchCriteriaId":"A8711FA8-827F-4887-BB20-53A4B0E6E9C9"}]}]}],"references":[{"url":"https://github.com/goharbor/harbor/security/advisories/GHSA-6qj9-33j4-rvhg","source":"vulnreport@tenable.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.tenable.com/security/research/tra-2019-50","source":"vulnreport@tenable.com","tags":["Third Party Advisory"]},{"url":"https://github.com/goharbor/harbor/security/advisories/GHSA-6qj9-33j4-rvhg","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.tenable.com/security/research/tra-2019-50","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}