Plain Text Database Vulnerability Exposes Quay's Redis Instance to Attack

CVE-2024-3625
7.3HIGH

Key Information

Vendor
Red Hat
Status
Mirror Registry For Red Hat Openshift
Vendor
CVE Published:
25 April 2024

Summary

A flaw was found in Quay, where Quay's database is stored in plain text in mirror-registry on Jinja's config.yaml file. This issue leaves the possibility of a malicious actor with access to this file to gain access to Quay's Redis instance.

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Risk change from: null to: 7.3 - (HIGH)

  • Vulnerability published.

  • Reported to Red Hat.

Collectors

NVD DatabaseMitre Database

Credit

Red Hat would like to thank Solomon Roberts (BadgerOps.net works) for reporting this issue.
.