Vulnerability Description
A vulnerability was found in Quay. If an attacker can obtain the client ID for an application, they can use an OAuth token to authenticate despite not having access to the organization from which the application was created. This issue is limited to authentication and not authorization. However, in configurations where endpoints rely only on authentication, a user may authenticate to applications they otherwise have no access to.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Quay | 3.0.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2024-5891Broken Link
- https://bugzilla.redhat.com/show_bug.cgi?id=2283879Issue TrackingPermissions Required
- https://access.redhat.com/security/cve/CVE-2024-5891Broken Link
- https://bugzilla.redhat.com/show_bug.cgi?id=2283879Issue TrackingPermissions Required
FAQ
What is CVE-2024-5891?
CVE-2024-5891 is a vulnerability with a CVSS score of 4.2 (MEDIUM). A vulnerability was found in Quay. If an attacker can obtain the client ID for an application, they can use an OAuth token to authenticate despite not having access to the organization from which the ...
How severe is CVE-2024-5891?
CVE-2024-5891 has been rated MEDIUM with a CVSS base score of 4.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-5891?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Quay.