CVE-2024-3622

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:mirror_registry:-:*:*:*:*:*:*:*

History

30 Jul 2025, 14:41

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2024-3622 - () https://access.redhat.com/security/cve/CVE-2024-3622 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2274400 - () https://bugzilla.redhat.com/show_bug.cgi?id=2274400 - Issue Tracking, Vendor Advisory
CPE cpe:2.3:a:redhat:mirror_registry:-:*:*:*:*:*:*:*
First Time Redhat
Redhat mirror Registry

21 Nov 2024, 09:30

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2024-3622 - () https://access.redhat.com/security/cve/CVE-2024-3622 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=2274400 - () https://bugzilla.redhat.com/show_bug.cgi?id=2274400 -

26 Apr 2024, 12:58

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-25 18:15

Updated : 2025-07-30 14:41


NVD link : CVE-2024-3622

Mitre link : CVE-2024-3622

CVE.ORG link : CVE-2024-3622


JSON object : View

Products Affected

redhat

  • mirror_registry
CWE
CWE-256

Plaintext Storage of a Password