Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-7777

Опубликовано: 21 июл. 2025
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

The mirror-registry doesn't properly sanitize the host header HTTP header in HTTP request received, allowing an attacker to perform malicious redirects to attacker-controlled domains or phishing campaigns.

Отчет

The Red Hat Product Security Team has rated this vulnerability as having a Moderate severity. This happens because, although this type of vulnerability usually may lead to important consequences like web-cache poisoning or to access other vhosts that should not be exposed, the mirror-registry is running as a single vhost in a single pod and is not performing request caching thus not being vulnerable to web-cache poisoning. Additionally the usual password reset manipulation/phishing strategy that could be used with the host header injection is not possible here as such requests are handled by RHSSO instead of the mirror-registry itself.

Меры по смягчению последствий

There's currently no available mitigation for this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
mirror registry for Red Hat OpenShiftmirror-registry-containerFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2382545mirror-registry: host header injection in mirror-registry

EPSS

Процентиль: 9%
0.00035
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
26 дней назад

The mirror-registry doesn't properly sanitize the host header HTTP header in HTTP request received, allowing an attacker to perform malicious redirects to attacker-controlled domains or phishing campaigns.

CVSS3: 6.5
github
26 дней назад

The mirror-registry doesn't properly sanitize the host header HTTP header in HTTP request received, allowing an attacker to perform malicious redirects to attacker-controlled domains or phishing campaigns.

EPSS

Процентиль: 9%
0.00035
Низкий

6.5 Medium

CVSS3