โ— LIVE
OpenAI releases GPT-5 APIIndia AI startup raises $120MBitcoin ETF hits record inflowsMeta Llama 4 benchmarks leakedOpenAI releases GPT-5 APIIndia AI startup raises $120MBitcoin ETF hits record inflowsMeta Llama 4 benchmarks leaked
๐Ÿ“… Sun, 29 Mar, 2026โœˆ๏ธ Telegram
AiFeed24

AI & Tech News

๐Ÿ”
โœˆ๏ธ Follow
๐Ÿ Home๐Ÿค–AI๐Ÿ’ปTech๐Ÿš€Startupsโ‚ฟCrypto๐Ÿ”’Security๐Ÿ‡ฎ๐Ÿ‡ณIndiaโ˜๏ธCloud๐Ÿ”ฅDeals
โœˆ๏ธ News Channel๐Ÿ›’ Deals Channel
Home/Cloud & DevOps/GHSA-PRH4-VHFH-24MJ: GHSA-PRH4-VHFH-24MJ: Information Exposure in Harbor Configuration Audit Logs
โ˜๏ธCloud & DevOps

GHSA-PRH4-VHFH-24MJ: GHSA-PRH4-VHFH-24MJ: Information Exposure in Harbor Configuration Audit Logs

GHSA-PRH4-VHFH-24MJ: Information Exposure in Harbor Configuration Audit Logs Vulnerability ID: GHSA-PRH4-VHFH-24MJ CVSS Score: 5.3 Published: 2026-03-26 Harbor, an open-source cloud native registry, contains a Moderate severity vulnerability (CWE-532) in its audit logging subsystem. The application

โšกQuick SummaryAI generating...
C

CVE Reports

๐Ÿ“… Mar 27, 2026ยทโฑ 3 min readยทDev.to โ†—
โœˆ๏ธ Telegram๐• TweetWhatsApp
๐Ÿ“ก

Original Source

Dev.to

https://dev.to/cverports/ghsa-prh4-vhfh-24mj-ghsa-prh4-vhfh-24mj-information-exposure-in-harbor-configuration-audit-logs-1f5c
Read Full โ†—

GHSA-PRH4-VHFH-24MJ: Information Exposure in Harbor Configuration Audit Logs

Vulnerability ID: GHSA-PRH4-VHFH-24MJ
CVSS Score: 5.3
Published: 2026-03-26

Harbor, an open-source cloud native registry, contains a Moderate severity vulnerability (CWE-532) in its audit logging subsystem. The application relies on an incomplete blacklist to redact sensitive data from configuration payloads. This failure causes LDAP passwords, specifically ldap_search_password, and OpenID Connect (OIDC) client secrets to be written to the database in plain text within the operation description field. This vulnerability allows authorized users with audit log access to retrieve enterprise directory credentials.

TL;DR

Harbor fails to properly redact sensitive configuration parameters from its audit logs. This exposes LDAP and OIDC credentials in plain text to any user with audit log read access, requiring an upgrade to version 2.15.0 and immediate rotation of exposed secrets.

Technical Details

  • Vulnerability Class: CWE-532: Insertion of Sensitive Information into Log File
  • Attack Vector: Authenticated Application Access (Audit Logs)
  • Impact: Exposure of External Directory Credentials (LDAP/OIDC)
  • Exploit Status: Unexploited / No Public PoC
  • Fix Approach: Deny-all / Complete Payload Removal from Logs
  • Key Vulnerable Component: src/pkg/auditext/event/config/config.go

Affected Systems

  • Harbor Container Registry (< 2.15.0)
  • Harbor: < 2.15.0 (Fixed in: 2.15.0)

Code Analysis

Commit: 85e7564

Fix: Adopt a deny-all approach for configuration audit logs by replacing payload interpolation with a static string.

Mitigation Strategies

  • Upgrade to Harbor v2.15.0 or later to completely remove configuration request payloads from audit logging.
  • Purge or manually redact historical configuration update entries within the audit_log database table.
  • Enforce the principle of least privilege for the LDAP service account used by Harbor.
  • Proactively monitor logs for unauthorized access attempts originating from Harbor-associated service accounts.

Remediation Steps:

  1. Identify the current version of Harbor running in your environment.
  2. Pull the Harbor v2.15.0 (or newer) release and apply the upgrade according to official documentation.
  3. Connect to the Harbor backing database and query the audit_log table for rows where the op_desc field contains sensitive configuration data.
  4. Delete or obfuscate the identified legacy log entries.
  5. Generate new LDAP bind passwords and OIDC client secrets.
  6. Update the new credentials in the Harbor management interface to ensure directory synchronization is maintained.

References

  • GitHub Security Advisory: GHSA-PRH4-VHFH-24MJ
  • Harbor Repository

Read the full report for GHSA-PRH4-VHFH-24MJ on our website for more details including interactive diagrams and full exploit analysis.

Tags:#cloud#dev.to

Found this useful? Share it!

โœˆ๏ธ Telegram๐• TweetWhatsApp

Read the Full Story

Continue reading on Dev.to

Visit Dev.to โ†—

Related Stories

โ˜๏ธ
โ˜๏ธCloud & DevOps

Stop Copying Skills Between Claude Code, Cursor, and Codex

about 3 hours ago

โ˜๏ธ
โ˜๏ธCloud & DevOps

Agentic Architectures โ€” Article 2: Advanced Coordination and Reasoning Patterns

about 3 hours ago

โ˜๏ธ
โ˜๏ธCloud & DevOps

Agentic Architectures โ€” Article 1: The Agentic AI Maturity Model

about 3 hours ago

โ˜๏ธ
โ˜๏ธCloud & DevOps

Reimagining Creativity: Inside IdeaForge

about 3 hours ago

๐Ÿ“ก Source Details

Dev.to

๐Ÿ“… Mar 27, 2026

๐Ÿ• 3 days ago

โฑ 3 min read

๐Ÿ—‚ Cloud & DevOps

Read Original โ†—

Web Hosting

๐ŸŒ Hostinger โ€” 80% Off Hosting

Start your website for โ‚น69/mo. Free domain + SSL included.

Claim Deal โ†’

๐Ÿ“ฌ AiFeed24 Daily

Top 5 AI & tech stories every morning. Join 40,000+ readers.

โœฆ 40,218 subscribers ยท No spam, ever

Cloud Hosting

โ˜๏ธ Vultr โ€” $100 Free Credit

Deploy cloud servers in 25+ locations. From $2.50/mo. No contract.

Claim $100 Credit โ†’
AiFeed24

India's AI-powered technology news platform. Curated from 60+ trusted sources, updated every hour.

โœˆ๏ธ @aipulsedailyontime (News)๐Ÿ›’ @GadgetDealdone (Deals)

Categories

๐Ÿค– Artificial Intelligence๐Ÿ’ป Technology๐Ÿš€ Startupsโ‚ฟ Crypto๐Ÿ”’ Security๐Ÿ‡ฎ๐Ÿ‡ณ India Techโ˜๏ธ Cloud๐Ÿ“ฑ Mobile

Company

About UsContactEditorial PolicyAdvertiseDealsAll StoriesRSS Feed

Daily Digest

Top AI & tech stories every morning. Free forever.

Privacy PolicyTerms & ConditionsCookie PolicyDisclaimerSitemap

ยฉ 2026 AiFeed24. All rights reserved.

Affiliate disclosure: We earn commissions on qualifying purchases. Learn more