Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-3622

Опубликовано: 10 апр. 2024
Источник: redhat
CVSS3: 8.8

Описание

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
mirror registry for Red Hat OpenShiftmirror-registry-containerAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-256
https://bugzilla.redhat.com/show_bug.cgi?id=2274400mirror-registry: Plain-text default CSRF secret key

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
почти 2 года назад

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.

CVSS3: 8.8
github
почти 2 года назад

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.

CVSS3: 8.8
fstec
почти 2 года назад

Уязвимость программного средства создания локальных копий удаленного реестра образов контейнеров Mirror registry for Red Hat OpenShift, связанная с незашифрованным хранением критичной информации, позволяющая создать сеансовые файлы cookie и получить несанкционированный доступ к затронутому экземпляру Quay

8.8 High

CVSS3