A vulnerability was found in Quay. If an attacker can obtain the client ID for an application, they can use an OAuth token to authenticate despite not having access to the organization from which the application was created. This issue is limited to authentication and not authorization. However, in configurations where endpoints rely only on authentication, a user may authenticate to applications they otherwise have no access to.
The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does not sufficiently prove that the claimed identity is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Quay | Redhat | 3.0.0 (including) | 3.0.0 (including) |
Attackers may be able to bypass weak authentication faster and/or with less effort than expected.