not performed when the label comes from an image. This flaw allows an attacker to publish a malicious image to a public registry containing a script that can be executed via Cross-site scripting (XSS).
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44051 | A flaw was found in the Quay registry. While the image labels created through Quay undergo validation both in the UI and backend by applying a regex (validation.py), the same validation is not performed when the label comes from an image. This flaw allows an attacker to publish a malicious image to a public registry containing a script that can be executed via Cross-site scripting (XSS). |
Wed, 13 Nov 2024 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-07T00:08:14.932Z
Reserved: 2023-06-23T09:29:36.852Z
Link: CVE-2023-3384
Updated: 2024-08-02T06:55:03.375Z
Status : Modified
Published: 2023-07-24T16:15:12.523
Modified: 2024-11-21T08:17:09.093
Link: CVE-2023-3384
OpenCVE Enrichment
No data.
EUVD