First published: Wed Apr 10 2024(Updated: )
A flaw was found in how Quay's database is stored in plain-text in mirror-registry on the jinja's config.yaml file. This flaw allows a malicious actor with access to this file to gain access to Quay's database.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Quay for IBM Z and LinuxONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3624 is a critical vulnerability that exposes sensitive database information due to insecure plain-text storage.
To fix CVE-2024-3624, secure the configuration files by encrypting sensitive data and restrict access to the mirror-registry's config.yaml.
CVE-2024-3624 affects users of Red Hat Quay, particularly those using the mirror-registry feature.
CVE-2024-3624 exposes Quay's database credentials, which can lead to unauthorized database access.
The potential impacts of CVE-2024-3624 include data breaches, unauthorized access to sensitive information, and potential loss of data integrity.