A flaw was found in mirror-registry. Authenticated users can exploit the log export feature by providing a specially crafted web address (URL). This allows the application's backend to make arbitrary requests to internal network resources, a vulnerability known as Server-Side Request Forgery (SSRF). This could lead to unauthorized access to sensitive information or other internal systems.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in mirror-registry. Authenticated users can exploit the log export feature by providing a specially crafted web address (URL). This allows the application's backend to make arbitrary requests to internal network resources, a vulnerability known as Server-Side Request Forgery (SSRF). This could lead to unauthorized access to sensitive information or other internal systems. | |
| Title | Mirror-registry: quay: quay: server-side request forgery via log export functionality | |
| First Time appeared |
Redhat
Redhat mirror Registry Redhat quay |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:/a:redhat:mirror_registry:1 cpe:/a:redhat:mirror_registry:2 cpe:/a:redhat:quay:3 |
|
| Vendors & Products |
Redhat
Redhat mirror Registry Redhat quay |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-08T16:26:07.649Z
Reserved: 2026-02-11T20:57:59.704Z
Link: CVE-2026-2377
No data.
Status : Received
Published: 2026-04-08T17:21:16.237
Modified: 2026-04-08T17:21:16.237
Link: CVE-2026-2377
No data.
OpenCVE Enrichment
No data.
Weaknesses