First published: Fri Jun 23 2023(Updated: )
A flaw was found in the Quay registry. While the image labels created through Quay undergo validation both in the UI and backend by applying a regex (validation.py), the same validation is not performed when the label comes from an image. This flaw allows an attacker to publish a malicious image to a public registry containing a script that can be executed via Cross-site scripting (XSS).
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Quay | =3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2023-3384.
The severity of CVE-2023-3384 is medium, with a CVSS score of 5.4.
The Redhat Quay version 3.0.0 is affected by CVE-2023-3384.
The CWE ID associated with CVE-2023-3384 is CWE-79.
Yes, there is a fix available for CVE-2023-3384. Please refer to the references provided for more information.