The mirror-registry doesn't properly sanitize the host header HTTP header in HTTP request received, allowing an attacker to perform malicious redirects to attacker-controlled domains or phishing campaigns.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2025-7777 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2382545 | issue tracking |