Executive Summary

Informations
Name CVE-2024-5891 First vendor Publication 2024-06-12
Vendor Cve Last vendor Modification 2024-10-04

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Overall CVSS Score 4.2
Base Score 4.2 Environmental Score 4.2
impact SubScore 2.5 Temporal Score 4.2
Exploitabality Sub Score 1.6
 
Attack Vector Network Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact Low
Integrity Impact Low Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability was found in Quay. If an attacker can obtain the client ID for an application, they can use an OAuth token to authenticate despite not having access to the organization from which the application was created. This issue is limited to authentication and not authorization. However, in configurations where endpoints rely only on authentication, a user may authenticate to applications they otherwise have no access to.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5891

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Sources (Detail)

https://access.redhat.com/security/cve/CVE-2024-5891
https://bugzilla.redhat.com/show_bug.cgi?id=2283879
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2024-10-04 17:27:41
  • Multiple Updates
2024-09-26 21:27:48
  • Multiple Updates
2024-06-14 05:27:26
  • Multiple Updates
2024-06-12 21:27:22
  • First insertion