Quay's Database Vulnerability: Plain-Text Storage Exposes Sensitive Data
CVE-2024-3624
7.3HIGH
Summary
A security issue has been identified in Quay, a container registry service by Red Hat, involving the insecure storage of database credentials within the mirror-registry's configuration file (config.yaml). This flaw permits malicious actors, who gain access to this file, to retrieve sensitive database information, compromising the integrity and confidentiality of the data stored within Quay's database. It emphasizes the importance of securing configuration files and utilizing encryption for sensitive data storage to mitigate potential security threats.
References
CVSS V3.1
Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Collectors
NVD DatabaseMitre Database
Credit
Red Hat would like to thank Solomon Roberts (BadgerOps.net works) for reporting this issue.