๐Ÿ” CVE Alert

CVE-2024-3623

MEDIUM 6.5

Mirror-registry: default database secret key stored in plain-text on initial configuration file

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database.

CWE CWE-256
Published Apr 25, 2024
Last Updated Jan 21, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new medium vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

Red Hat / mirror registry for Red Hat OpenShift
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-3623 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2274404

Credits

Red Hat would like to thank Solomon Roberts (BadgerOps.net works) for reporting this issue.