Impact
A flaw in Red Hat mirror‑registry allows authenticated users to supply an arbitrary web address when exporting logs, causing the backend to perform server‑side requests. This Server‑Side Request Forgery can reach internal network resources, exposing sensitive data or permitting further attacks. The weakness is categorized as CWE‑918.
Affected Systems
The vulnerability affects Red Hat OpenShift mirror‑registry components and Quay 3. The specific affected packages include mirror‑registry version 1, mirror‑registry version 2, and Quay 3, as indicated by their Common Platform Enumeration strings.
Risk and Exploitability
The nominal CVSS score of 6.5 reflects a moderate severity, and the absence of an EPSS score makes the precise exploitation likelihood uncertain. The vulnerability is not listed in CISA’s KEV catalog, indicating no confirmed public exploits yet. Because the exploit requires an authenticated user with permission to export logs, an attacker must first gain legitimate access; from there they can trick the system into accessing internal resources. The risk is significant for environments where internal services are not properly segmented or monitored.
OpenCVE Enrichment