Upstream information
Description
A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
CNA (Red Hat) | National Vulnerability Database | |
---|---|---|
Base Score | 8.1 | 6.5 |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality Impact | High | High |
Integrity Impact | High | None |
Availability Impact | None | None |
CVSSv3 Version | 3.1 | 3.1 |
SUSE Timeline for this CVE
CVE page created: Thu Apr 11 00:00:15 2024CVE page last modified: Thu Jul 31 12:13:28 2025