First published: Wed Oct 09 2024(Updated: )
A vulnerability in Quay version 3.8.14 allows successful authentication even when a truncated version of the password is provided. This flaw affects the authentication mechanism, reducing the overall security of password enforcement.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Quay | =3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9683 has been classified as a critical severity vulnerability due to its impact on authentication processes.
To fix CVE-2024-9683, upgrade Quay to a version higher than 3.8.14 that addresses this authentication flaw.
CVE-2024-9683 affects Quay version 3.8.14 and earlier versions.
The impact of CVE-2024-9683 is a weakened authentication mechanism that allows attackers to bypass password enforcement.
Currently, the recommended approach for CVE-2024-9683 is to update to a patched version, as no official workaround exists.