First published: Thu Nov 14 2019(Updated: )
A vulnerability was found in the Quay web application. Sessions in the Quay web application never expire. An attacker, able to gain access to a session, could use it to control or delete a user's container repository. Red Hat Quay 2 and 3 are vulnerable to this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Quay | =2.0.0 | |
Redhat Quay | =3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3867 is a vulnerability found in the Quay web application where sessions never expire, allowing an attacker to control or delete a user's container repository.
Red Hat Quay versions 2.0.0 and 3.0.0 are affected by CVE-2019-3867.
CVE-2019-3867 has a severity rating of 4.1 (medium).
An attacker with access to a session can exploit CVE-2019-3867 to control or delete a user's container repository in the Quay web application.
Yes, you can find more information about CVE-2019-3867 in the following references: [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1772704) and [Red Hat Security Advisory](https://access.redhat.com/security/cve/cve-2019-3867).