No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in mirror-registry. Authenticated users can exploit the log export feature by providing a specially crafted web address (URL). This allows the application's backend to make arbitrary requests to internal network resources, a vulnerability known as Server-Side Request Forgery (SSRF). This could lead to unauthorized access to sensitive information or other internal systems. | |
| Title | Mirror-registry: quay: quay: server-side request forgery via log export functionality | |
| First Time appeared |
Redhat
Redhat mirror Registry Redhat quay |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:/a:redhat:mirror_registry:1 cpe:/a:redhat:mirror_registry:2 cpe:/a:redhat:quay:3 |
|
| Vendors & Products |
Redhat
Redhat mirror Registry Redhat quay |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-08T18:43:00.505Z
Reserved: 2026-02-11T20:57:59.704Z
Link: CVE-2026-2377
Updated: 2026-04-08T18:42:56.263Z
Status : Received
Published: 2026-04-08T17:21:16.237
Modified: 2026-04-08T17:21:16.237
Link: CVE-2026-2377
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:39:06Z