Redhat

Quay

33 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 22.04.2026 09:06:19
  • Zuletzt bearbeitet 22.04.2026 21:23:52

A flaw was found in Red Hat Quay. When Red Hat Quay requests password re-verification for sensitive operations, such as token generation or robot account creation, the re-authentication prompt can be bypassed. This allows a user with a timed-out sess...

  • EPSS 0.03%
  • Veröffentlicht 08.04.2026 17:06:58
  • Zuletzt bearbeitet 21.04.2026 23:20:00

A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it p...

  • EPSS 0.13%
  • Veröffentlicht 08.04.2026 17:04:22
  • Zuletzt bearbeitet 21.04.2026 23:20:52

A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on the Quay s...

  • EPSS 0.04%
  • Veröffentlicht 08.04.2026 17:04:20
  • Zuletzt bearbeitet 28.04.2026 07:16:03

A flaw was found in Red Hat Quay's container image upload process. An authenticated user with push access to any repository on the registry can interfere with image uploads in progress by other users, including those in repositories they do not have ...

  • EPSS 0.04%
  • Veröffentlicht 08.04.2026 16:26:07
  • Zuletzt bearbeitet 21.04.2026 17:59:53

A flaw was found in mirror-registry. Authenticated users can exploit the log export feature by providing a specially crafted web address (URL). This allows the application's backend to make arbitrary requests to internal network resources, a vulnerab...

  • EPSS 0.03%
  • Veröffentlicht 12.03.2026 19:16:16
  • Zuletzt bearbeitet 12.03.2026 21:16:25

A flaw was found in mirror-registry where an authenticated user can trick the system into accessing unintended internal or restricted systems by providing malicious web addresses. When the application processes these addresses, it automatically fol...

  • EPSS 0.23%
  • Veröffentlicht 06.05.2025 14:49:28
  • Zuletzt bearbeitet 31.07.2025 18:00:55

A flaw was found in Quay. When an organization acts as a proxy cache, and a user or robot pulls an image that hasn't been mirrored yet, they are granted "Admin" permissions on the newly created repository.

  • EPSS 0.3%
  • Veröffentlicht 17.10.2024 15:15:13
  • Zuletzt bearbeitet 03.12.2024 16:14:52

A vulnerability was found in Quay, which allows successful authentication even when a truncated password version is provided. This flaw affects the authentication mechanism, reducing the overall security of password enforcement.  While the risk is re...

  • EPSS 0.12%
  • Veröffentlicht 12.06.2024 14:15:12
  • Zuletzt bearbeitet 21.11.2024 09:48:31

A vulnerability was found in Quay. If an attacker can obtain the client ID for an application, they can use an OAuth token to authenticate despite not having access to the organization from which the application was created. This issue is limited to ...

  • EPSS 0.12%
  • Veröffentlicht 25.04.2024 18:15:09
  • Zuletzt bearbeitet 21.01.2026 14:16:05

A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-re...