Quay's Database Vulnerability: Plain-Text Storage Exposes Sensitive Data
CVE-2024-3624

7.3HIGH

Key Information:

Vendor
Red Hat
Vendor
CVE Published:
25 April 2024

Summary

A security issue has been identified in Quay, a container registry service by Red Hat, involving the insecure storage of database credentials within the mirror-registry's configuration file (config.yaml). This flaw permits malicious actors, who gain access to this file, to retrieve sensitive database information, compromising the integrity and confidentiality of the data stored within Quay's database. It emphasizes the importance of securing configuration files and utilizing encryption for sensitive data storage to mitigate potential security threats.

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

Collectors

NVD DatabaseMitre Database

Credit

Red Hat would like to thank Solomon Roberts (BadgerOps.net works) for reporting this issue.
.