๐Ÿ” CVE Alert

CVE-2024-3622

HIGH 8.8

Mirror-registry: plain-text default csrf secret key

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.

CWE CWE-256
Published Apr 25, 2024
Last Updated Nov 20, 2025
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / mirror registry for Red Hat OpenShift
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-3622 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2274400

Credits

Red Hat would like to thank Solomon Roberts (BadgerOps.net works) for reporting this issue.