CVE-2024-3625: Plaintext Storage of a Password
A flaw was found in Quay, where Quay's database is stored in plain text in mirror-registry on Jinja's config.yaml file. This issue leaves the possibility of a malicious actor with access to this file to gain access to Quay's Redis instance.
AI Analysis
Technical Summary
CVE-2024-3625 identifies a security vulnerability in Quay, a popular container image registry, where a password is stored in plaintext within the mirror-registry's config.yaml file, which is rendered using Jinja templates. This plaintext storage exposes sensitive credentials for Quay's Redis instance, a critical backend component used for caching and data storage. An attacker who gains access to this configuration file—either through compromised system access or misconfigured permissions—can retrieve the Redis password and subsequently access or manipulate the Redis instance. The vulnerability has a CVSS 3.1 base score of 7.3, indicating high severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality and integrity substantially (C:H/I:H/A:N). The flaw does not affect availability but can lead to unauthorized data access or modification within Redis, potentially undermining the integrity of container registry operations. No specific affected versions are listed, and no patches have been linked yet, but the issue was published on April 25, 2024. The vulnerability underscores the risks of insecure credential storage in configuration files and the importance of strict access controls and encryption for sensitive data within container infrastructure components.
Potential Impact
The primary impact of CVE-2024-3625 is unauthorized access to Quay's Redis instance due to exposure of plaintext credentials. This can lead to confidentiality breaches where sensitive data cached or stored in Redis is accessed by unauthorized parties. Integrity is also at risk, as attackers could modify or inject malicious data into Redis, potentially disrupting container image management, deployment workflows, or security policies enforced via Quay. While availability is not directly impacted, the compromise of Redis could indirectly affect service reliability or trustworthiness. Organizations relying on Quay for container image storage and distribution may face operational disruptions, data leakage, or further lateral movement within their infrastructure if attackers leverage this vulnerability. The requirement for low privileges and no user interaction lowers the barrier for exploitation once access to the config.yaml file is obtained, making it a significant risk especially in environments with weak file permission controls or insider threats.
Mitigation Recommendations
To mitigate CVE-2024-3625, organizations should immediately audit and restrict access permissions on the mirror-registry's config.yaml file to ensure only authorized system processes and administrators can read it. Employ file system access controls (e.g., Linux file permissions, SELinux/AppArmor policies) to prevent unauthorized local or network users from accessing sensitive configuration files. Encrypt sensitive credentials stored in configuration files or use secret management solutions (e.g., HashiCorp Vault, Kubernetes Secrets) to avoid plaintext storage. Monitor access logs for unusual or unauthorized attempts to read configuration files or connect to Redis. Network segmentation should isolate Redis instances, limiting access to trusted hosts only. Apply any patches or updates released by Quay maintainers promptly once available. Additionally, consider rotating Redis passwords and credentials after remediation to invalidate any potentially compromised secrets. Regular security reviews of container registry infrastructure and configuration management practices are recommended to prevent similar issues.
Affected Countries
United States, Germany, United Kingdom, Canada, Netherlands, France, Australia, Japan, South Korea, India
CVE-2024-3625: Plaintext Storage of a Password
Description
A flaw was found in Quay, where Quay's database is stored in plain text in mirror-registry on Jinja's config.yaml file. This issue leaves the possibility of a malicious actor with access to this file to gain access to Quay's Redis instance.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-3625 identifies a security vulnerability in Quay, a popular container image registry, where a password is stored in plaintext within the mirror-registry's config.yaml file, which is rendered using Jinja templates. This plaintext storage exposes sensitive credentials for Quay's Redis instance, a critical backend component used for caching and data storage. An attacker who gains access to this configuration file—either through compromised system access or misconfigured permissions—can retrieve the Redis password and subsequently access or manipulate the Redis instance. The vulnerability has a CVSS 3.1 base score of 7.3, indicating high severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality and integrity substantially (C:H/I:H/A:N). The flaw does not affect availability but can lead to unauthorized data access or modification within Redis, potentially undermining the integrity of container registry operations. No specific affected versions are listed, and no patches have been linked yet, but the issue was published on April 25, 2024. The vulnerability underscores the risks of insecure credential storage in configuration files and the importance of strict access controls and encryption for sensitive data within container infrastructure components.
Potential Impact
The primary impact of CVE-2024-3625 is unauthorized access to Quay's Redis instance due to exposure of plaintext credentials. This can lead to confidentiality breaches where sensitive data cached or stored in Redis is accessed by unauthorized parties. Integrity is also at risk, as attackers could modify or inject malicious data into Redis, potentially disrupting container image management, deployment workflows, or security policies enforced via Quay. While availability is not directly impacted, the compromise of Redis could indirectly affect service reliability or trustworthiness. Organizations relying on Quay for container image storage and distribution may face operational disruptions, data leakage, or further lateral movement within their infrastructure if attackers leverage this vulnerability. The requirement for low privileges and no user interaction lowers the barrier for exploitation once access to the config.yaml file is obtained, making it a significant risk especially in environments with weak file permission controls or insider threats.
Mitigation Recommendations
To mitigate CVE-2024-3625, organizations should immediately audit and restrict access permissions on the mirror-registry's config.yaml file to ensure only authorized system processes and administrators can read it. Employ file system access controls (e.g., Linux file permissions, SELinux/AppArmor policies) to prevent unauthorized local or network users from accessing sensitive configuration files. Encrypt sensitive credentials stored in configuration files or use secret management solutions (e.g., HashiCorp Vault, Kubernetes Secrets) to avoid plaintext storage. Monitor access logs for unusual or unauthorized attempts to read configuration files or connect to Redis. Network segmentation should isolate Redis instances, limiting access to trusted hosts only. Apply any patches or updates released by Quay maintainers promptly once available. Additionally, consider rotating Redis passwords and credentials after remediation to invalidate any potentially compromised secrets. Regular security reviews of container registry infrastructure and configuration management practices are recommended to prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2024-04-10T18:03:06.061Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691f628a40b920e2707a8c35
Added to database: 11/20/2025, 6:48:42 PM
Last enriched: 2/28/2026, 4:53:08 AM
Last updated: 3/22/2026, 5:18:00 PM
Views: 118
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.