Plain Text Database Vulnerability Exposes Quay's Redis Instance to Attack
CVE-2024-3625
7.3HIGH
Summary
A significant data exposure vulnerability has been identified in Quay, a popular container registry operated by Red Hat. The flaw arises from storing the Quay database in plain text within the mirror-registry configuration file, config.yaml. This configuration exposes critical data, potentially allowing malicious actors who gain access to this file to connect to the accessible Redis instance linked to Quay. This vulnerability underscores the importance of securing sensitive configuration files to prevent unauthorized access to backend services.
References
CVSS V3.1
Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Collectors
NVD DatabaseMitre Database
Credit
Red Hat would like to thank Solomon Roberts (BadgerOps.net works) for reporting this issue.