Логотип exploitDog
bind:CVE-2024-3622
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-3622

Количество 4

Количество 4

redhat логотип

CVE-2024-3622

почти 2 года назад

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2024-3622

почти 2 года назад

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-mxf6-v5wp-cvxx

почти 2 года назад

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2024-03905

почти 2 года назад

Уязвимость программного средства создания локальных копий удаленного реестра образов контейнеров Mirror registry for Red Hat OpenShift, связанная с незашифрованным хранением критичной информации, позволяющая создать сеансовые файлы cookie и получить несанкционированный доступ к затронутому экземпляру Quay

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2024-3622

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-3622

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-mxf6-v5wp-cvxx

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-03905

Уязвимость программного средства создания локальных копий удаленного реестра образов контейнеров Mirror registry for Red Hat OpenShift, связанная с незашифрованным хранением критичной информации, позволяющая создать сеансовые файлы cookie и получить несанкционированный доступ к затронутому экземпляру Quay

CVSS3: 8.8
0%
Низкий
почти 2 года назад

Уязвимостей на страницу