First published: Mon Jan 11 2021(Updated: )
This release of Red Hat Quay v3.3.3 includes:<br>Security Update(s):<br><li> quay: persistent XSS in repository notification display (CVE-2020-27832)</li> <li> quay: email notifications authorization bypass (CVE-2020-27831)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page(s) listed in the References section.<br>Bug Fix(es):<br><li> NVD feed fixed in Clair-v2 (clair-jwt image)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Quay for IBM Z and LinuxONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2021:0050 has a moderate severity rating due to vulnerabilities including XSS and authorization bypass.
To fix RHSA-2021:0050, update Red Hat Quay to version 3.3.3 or later, which includes the necessary security patches.
RHSA-2021:0050 addresses persistent XSS vulnerability (CVE-2020-27832) and email notifications authorization bypass (CVE-2020-27831).
RHSA-2021:0050 affects Red Hat Quay, specifically version 3.3.3 and earlier versions.
The vulnerabilities in RHSA-2021:0050 could allow attackers to execute scripts in the context of user sessions and bypass authorization checks.