Vulnerability Description
A flaw was found in Quay. Cross-site request forgery (CSRF) attacks force a user to perform unwanted actions in an application. During the pentest, it was detected that the config-editor page is vulnerable to CSRF. The config-editor page is used to configure the Quay instance. By coercing the victim’s browser into sending an attacker-controlled request from another domain, it is possible to reconfigure the Quay instance (including adding users with admin privileges).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Quay | 3.0.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2023-4959Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2238908Issue TrackingVendor Advisory
- https://access.redhat.com/security/cve/CVE-2023-4959Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2238908Issue TrackingVendor Advisory
FAQ
What is CVE-2023-4959?
CVE-2023-4959 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A flaw was found in Quay. Cross-site request forgery (CSRF) attacks force a user to perform unwanted actions in an application. During the pentest, it was detected that the config-editor page is vulne...
How severe is CVE-2023-4959?
CVE-2023-4959 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-4959?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Quay.