Lucene search

K
cvelistRedhatCVELIST:CVE-2024-3622
HistoryApr 25, 2024 - 5:46 p.m.

CVE-2024-3622 Mirror-registry: plain-text default csrf secret key

2024-04-2517:46:29
CWE-256
redhat
www.cve.org
1
cve-2024-3622
mirror-registry
plain-text
default
csrf
secret key
quay
configuration template
session cookies
malicious actor
access

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.

CNA Affected

[
  {
    "vendor": "Red Hat",
    "product": "mirror registry for Red Hat OpenShift",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openshift/mirror-registry-rhel8",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:mirror_registry:1"
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for CVELIST:CVE-2024-3622