← Zuruck zu CVEs
CVE-2026-32591
MEDIUM5.2
Beschreibung
A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application.
CVE Details
CVSS v3.1 Bewertung5.2
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienHIGH
BenutzerinteraktionREQUIRED
Veroffentlicht4/8/2026
Zuletzt geandert4/8/2026
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-918
Referenzen
https://access.redhat.com/security/cve/CVE-2026-32591(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2446965(secalert@redhat.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.