Impact
This vulnerability allows an authenticated user to supply arbitrary URLs to the mirror‑registry service. During processing the service follows redirects without validating the ultimate destination, enabling the attacker to force the system to reach internal or otherwise restricted resources. This can lead to unauthorized data exposure or other exploitation of internal systems.
Affected Systems
Affected products are Red Hat Quay 3 and the mirror registry for Red Hat OpenShift (versions 1 and 2). All instances of these components that have not been updated to the patched release are vulnerable.
Risk and Exploitability
The CVSS score of 4.9 indicates modest severity, and the EPSS score is below 1%, implying a low likelihood of exploitation in the wild. The vulnerability is not listed in the KEV catalog. Exploitation requires a user who can authenticate to the affected application and supply a crafted redirect URL; the application then forwards the request to internal hosts. There are no external dependencies beyond legitimate authentication.
OpenCVE Enrichment