Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5891: Weak Authentication in Red Hat Red Hat Quay 3

0
Medium
VulnerabilityCVE-2024-5891cvecve-2024-5891
Published: Wed Jun 12 2024 (06/12/2024, 13:16:54 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Quay 3

Description

A vulnerability was found in Quay. If an attacker can obtain the client ID for an application, they can use an OAuth token to authenticate despite not having access to the organization from which the application was created. This issue is limited to authentication and not authorization. However, in configurations where endpoints rely only on authentication, a user may authenticate to applications they otherwise have no access to.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 02:54:18 UTC

Technical Analysis

CVE-2024-5891 is a vulnerability identified in Red Hat Quay 3, a container image registry platform. The issue arises from weak authentication mechanisms related to OAuth token usage. Specifically, if an attacker can obtain the client ID of an application, they can leverage an OAuth token to authenticate to that application even if they lack access rights to the organization that owns the application. This vulnerability does not affect authorization controls directly; it only impacts authentication. However, in scenarios where applications or endpoints rely solely on authentication without enforcing proper authorization checks, an attacker could gain unauthorized access to resources or services. The vulnerability requires the attacker to have low privileges (PR:L) and does not require user interaction (UI:N), but the attack complexity is high (AC:H), indicating some non-trivial conditions must be met to exploit it. The CVSS v3.1 base score is 4.2, reflecting limited confidentiality and integrity impacts and no availability impact. No known exploits have been reported in the wild. The vulnerability highlights the importance of separating authentication from authorization and ensuring that authorization is enforced independently to prevent unauthorized access even if authentication is bypassed or weakened.

Potential Impact

The primary impact of CVE-2024-5891 is unauthorized authentication to applications within Red Hat Quay 3 environments. While the vulnerability does not directly grant authorization, it can lead to unauthorized access if applications rely solely on authentication for access control. This can result in exposure of sensitive container images, metadata, or internal services to unauthorized users. Organizations using Red Hat Quay 3 in their container supply chain or DevOps pipelines may face risks of data leakage or unauthorized manipulation of container images. The impact is limited to confidentiality and integrity, with no direct availability impact. However, the potential for unauthorized access could facilitate further attacks or lateral movement within an environment. Since Red Hat Quay is widely used in enterprise container management, organizations with containerized workloads and DevOps practices are at risk. The medium severity score reflects the need for attention but indicates that exploitation requires specific conditions and is not trivial.

Mitigation Recommendations

1. Immediately review and update OAuth client ID management practices to ensure client IDs are not exposed or easily obtainable by unauthorized parties. 2. Enforce strict authorization checks on all endpoints and applications, ensuring that authentication alone does not grant access. Implement role-based access control (RBAC) or attribute-based access control (ABAC) mechanisms. 3. Apply the latest patches and updates from Red Hat as they become available to address this vulnerability directly. 4. Audit existing applications and services integrated with Red Hat Quay 3 to verify that they do not rely solely on authentication for access control. 5. Monitor logs and authentication events for unusual OAuth token usage or authentication attempts from unexpected client IDs. 6. Consider implementing additional layers of security such as network segmentation and multi-factor authentication (MFA) where applicable. 7. Educate development and operations teams about the distinction between authentication and authorization to prevent similar misconfigurations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-06-12T03:55:16.696Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bf6b7ef31ef0b55d10f

Added to database: 2/25/2026, 9:39:02 PM

Last enriched: 2/26/2026, 2:54:18 AM

Last updated: 4/12/2026, 12:18:06 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses