Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32201 | A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance. |
Wed, 30 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:redhat:mirror_registry:-:*:*:*:*:*:*:* |
Tue, 24 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-20T07:13:29.991Z
Reserved: 2024-04-10T18:02:57.781Z
Link: CVE-2024-3622
Updated: 2024-08-01T20:19:58.921Z
Status : Analyzed
Published: 2024-04-25T18:15:09.747
Modified: 2025-07-30T14:41:38.910
Link: CVE-2024-3622
OpenCVE Enrichment
No data.
EUVD