Plain Text Database Vulnerability Exposes Quay's Redis Instance to Attack
CVE-2024-3625
7.3HIGH
Key Information
- Vendor
- Red Hat
- Status
- Mirror Registry For Red Hat Openshift
- Vendor
- CVE Published:
- 25 April 2024
Summary
A flaw was found in Quay, where Quay's database is stored in plain text in mirror-registry on Jinja's config.yaml file. This issue leaves the possibility of a malicious actor with access to this file to gain access to Quay's Redis instance.
CVSS V3.1
Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Risk change from: null to: 7.3 - (HIGH)
Vulnerability published.
Reported to Red Hat.
Collectors
NVD DatabaseMitre Database
Credit
Red Hat would like to thank Solomon Roberts (BadgerOps.net works) for reporting this issue.