Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3p65-76g6-3w7r | Distribution affected by pull-through cache credential exfiltration via www-authenticate bearer realm |
Thu, 09 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Distribution Project
Distribution Project distribution |
|
| CPEs | cpe:2.3:a:distribution_project:distribution:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Distribution Project
Distribution Project distribution |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Distribution
Distribution distribution |
|
| Vendors & Products |
Distribution
Distribution distribution |
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 06 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, in pull-through cache mode, distribution discovers token auth endpoints by parsing WWW-Authenticate challenges returned by the configured upstream registry. The realm URL from a bearer challenge is used without validating that it matches the upstream registry host. As a result, an attacker-controlled upstream (or an attacker with MitM position to the upstream) can cause distribution to send the configured upstream credentials via basic auth to an attacker-controlled realm URL. This vulnerability is fixed in 3.1.0. | |
| Title | Distribution affected by pull-through cache credential exfiltration via www-authenticate bearer realm | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T15:04:50.154Z
Reserved: 2026-03-20T18:05:11.831Z
Link: CVE-2026-33540
Updated: 2026-04-06T15:04:39.539Z
Status : Analyzed
Published: 2026-04-06T15:17:10.950
Modified: 2026-04-09T18:36:53.427
Link: CVE-2026-33540
OpenCVE Enrichment
Updated: 2026-04-10T09:45:16Z
Github GHSA