A flaw was found in Quay. Cross-site request forgery (CSRF) attacks force a user to perform unwanted actions in an application. During the pentest, it was detected that the config-editor page is vulnerable to CSRF. The config-editor page is used to configure the Quay instance. By coercing the victim’s browser into sending an attacker-controlled request from another domain, it is possible to reconfigure the Quay instance (including adding users with admin privileges).
History

Wed, 13 Nov 2024 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2023-09-15T09:51:26.867Z

Updated: 2024-11-13T23:04:26.229Z

Reserved: 2023-09-14T09:07:57.784Z

Link: CVE-2023-4959

cve-icon Vulnrichment

Updated: 2024-08-02T07:44:53.219Z

cve-icon NVD

Status : Modified

Published: 2023-09-15T10:15:07.697

Modified: 2024-11-21T08:36:20.640

Link: CVE-2023-4959

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-09-15T00:00:00Z

Links: CVE-2023-4959 - Bugzilla