HKUDS OpenHarness Insecure Default Configuration Vulnerability
HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit permissive access, potentially leading to unauthorized file disclosure and read access.
HKUDS OpenHarness, a tool whose function is not explicitly defined in the source material, prior to the remediation implemented in pull request #147, exhibits an insecure default configuration. This vulnerability arises because remote channels inherit the setting allow_from = ["*"]. This overly permissive configuration allows any remote sender to bypass admission checks, effectively negating intended access controls. The vulnerability was reported on April 21, 2026. Exploitation requires an attacker to reach the configured channel, opening a pathway to host-backed agent runtimes. Successful exploitation can lead to unauthorized file disclosure and read access via default-enabled read-only tools within the OpenHarness environment. Defenders should ensure they are running a version of OpenHarness patched with PR #147 or later.
Attack Chain
- Attacker gains network access to the OpenHarness instance.
- Attacker identifies a configured remote channel.
- Attacker leverages the inherited
allow_from = ["*"]configuration to bypass admission controls. - Attacker interacts with a host-backed agent runtime.
- Attacker exploits default-enabled read-only tools available within the runtime.
- Attacker gains unauthorized read access to sensitive files on the system.
- Attacker exfiltrates the disclosed files.
Impact
Successful exploitation of this vulnerability allows attackers to bypass intended access controls and gain unauthorized read access to files accessible to the OpenHarness agent. This could lead to the disclosure of sensitive information, potentially impacting confidentiality. The scope of the impact depends on the data accessible to the agent runtime and the sensitivity of those files. Given the default-enabled nature of the vulnerability, any OpenHarness deployment prior to PR #147 is potentially vulnerable.
Recommendation
- Upgrade HKUDS OpenHarness to a version including or following the remediation provided in PR #147.
- Monitor network connections to the OpenHarness instance for unexpected remote channel access, using a network monitoring solution.
- Audit the configuration of OpenHarness channels to ensure that
allow_fromis not set to["*"], but rather to a restrictive set of trusted senders.
Detection coverage 2
Detect OpenHarness Channel Configuration with Wildcard Allow List
highDetects OpenHarness channel configurations where 'allow_from' is set to a wildcard, indicating the insecure default configuration.
Detect Unauthorized Access to OpenHarness Agent Runtimes
mediumDetects network connections to OpenHarness agent runtimes from unexpected source IP addresses, potentially indicating exploitation of the insecure default configuration.
Detection queries are kept inside the platform. Get full rules →