Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5891: Weak Authentication in Red Hat Red Hat Quay 3

0
Medium
VulnerabilityCVE-2024-5891cvecve-2024-5891
Published: Wed Jun 12 2024 (06/12/2024, 13:16:54 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Quay 3

Description

CVE-2024-5891 is a medium-severity vulnerability in Red Hat Quay 3 involving weak authentication. An attacker who obtains a client ID for an application can use an OAuth token to authenticate without having access to the organization that created the application. This flaw affects authentication but not authorization directly. However, if applications rely solely on authentication without additional authorization checks, unauthorized users may gain access. The vulnerability requires low privileges and no user interaction but has a high attack complexity. There are no known exploits in the wild yet. Organizations using Red Hat Quay 3 should review their authentication and authorization configurations to mitigate risk. The vulnerability has a CVSS score of 4. 2, reflecting limited confidentiality and integrity impact but no availability impact.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:54:18 UTC

Technical Analysis

CVE-2024-5891 is a vulnerability identified in Red Hat Quay 3, a container image registry platform. The issue arises from weak authentication mechanisms related to OAuth token usage. Specifically, if an attacker can obtain the client ID of an application, they can leverage an OAuth token to authenticate to that application even if they lack access rights to the organization that owns the application. This vulnerability does not affect authorization controls directly; it only impacts authentication. However, in scenarios where applications or endpoints rely solely on authentication without enforcing proper authorization checks, an attacker could gain unauthorized access to resources or services. The vulnerability requires the attacker to have low privileges (PR:L) and does not require user interaction (UI:N), but the attack complexity is high (AC:H), indicating some non-trivial conditions must be met to exploit it. The CVSS v3.1 base score is 4.2, reflecting limited confidentiality and integrity impacts and no availability impact. No known exploits have been reported in the wild. The vulnerability highlights the importance of separating authentication from authorization and ensuring that authorization is enforced independently to prevent unauthorized access even if authentication is bypassed or weakened.

Potential Impact

The primary impact of CVE-2024-5891 is unauthorized authentication to applications within Red Hat Quay 3 environments. While the vulnerability does not directly grant authorization, it can lead to unauthorized access if applications rely solely on authentication for access control. This can result in exposure of sensitive container images, metadata, or internal services to unauthorized users. Organizations using Red Hat Quay 3 in their container supply chain or DevOps pipelines may face risks of data leakage or unauthorized manipulation of container images. The impact is limited to confidentiality and integrity, with no direct availability impact. However, the potential for unauthorized access could facilitate further attacks or lateral movement within an environment. Since Red Hat Quay is widely used in enterprise container management, organizations with containerized workloads and DevOps practices are at risk. The medium severity score reflects the need for attention but indicates that exploitation requires specific conditions and is not trivial.

Mitigation Recommendations

1. Immediately review and update OAuth client ID management practices to ensure client IDs are not exposed or easily obtainable by unauthorized parties. 2. Enforce strict authorization checks on all endpoints and applications, ensuring that authentication alone does not grant access. Implement role-based access control (RBAC) or attribute-based access control (ABAC) mechanisms. 3. Apply the latest patches and updates from Red Hat as they become available to address this vulnerability directly. 4. Audit existing applications and services integrated with Red Hat Quay 3 to verify that they do not rely solely on authentication for access control. 5. Monitor logs and authentication events for unusual OAuth token usage or authentication attempts from unexpected client IDs. 6. Consider implementing additional layers of security such as network segmentation and multi-factor authentication (MFA) where applicable. 7. Educate development and operations teams about the distinction between authentication and authorization to prevent similar misconfigurations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-06-12T03:55:16.696Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bf6b7ef31ef0b55d10f

Added to database: 2/25/2026, 9:39:02 PM

Last enriched: 2/26/2026, 2:54:18 AM

Last updated: 2/26/2026, 9:41:04 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats