Quay's Database Vulnerability: Plain-Text Storage Exposes Sensitive Data
CVE-2024-3624
7.3HIGH
Key Information
- Vendor
- Red Hat
- Status
- Mirror Registry For Red Hat Openshift
- Vendor
- CVE Published:
- 25 April 2024
Summary
A flaw was found in how Quay's database is stored in plain-text in mirror-registry on the jinja's config.yaml file. This flaw allows a malicious actor with access to this file to gain access to Quay's database.
CVSS V3.1
Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Risk change from: null to: 7.3 - (HIGH)
Vulnerability published.
Reported to Red Hat.
Collectors
NVD DatabaseMitre Database
Credit
Red Hat would like to thank Solomon Roberts (BadgerOps.net works) for reporting this issue.