Количество 4
Количество 4
CVE-2024-3622
A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.
CVE-2024-3622
A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.
GHSA-mxf6-v5wp-cvxx
A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.
BDU:2024-03905
Уязвимость программного средства создания локальных копий удаленного реестра образов контейнеров Mirror registry for Red Hat OpenShift, связанная с незашифрованным хранением критичной информации, позволяющая создать сеансовые файлы cookie и получить несанкционированный доступ к затронутому экземпляру Quay
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-3622 A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance. | CVSS3: 8.8 | 0% Низкий | почти 2 года назад | |
CVE-2024-3622 A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance. | CVSS3: 8.8 | 0% Низкий | почти 2 года назад | |
GHSA-mxf6-v5wp-cvxx A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance. | CVSS3: 8.8 | 0% Низкий | почти 2 года назад | |
BDU:2024-03905 Уязвимость программного средства создания локальных копий удаленного реестра образов контейнеров Mirror registry for Red Hat OpenShift, связанная с незашифрованным хранением критичной информации, позволяющая создать сеансовые файлы cookie и получить несанкционированный доступ к затронутому экземпляру Quay | CVSS3: 8.8 | 0% Низкий | почти 2 года назад |
Уязвимостей на страницу