Vulnerability Details CVE-2019-3864
A vulnerability was discovered in all quay-2 versions before quay-3.0.0, in the Quay web GUI where POST requests include a specific parameter which is used as a CSRF token. The token is not refreshed for every request or when a user logged out and in again. An attacker could use a leaked token to gain access to the system using the user's account.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 37.8%
CVSS Severity
CVSS v3 Score 5.4
CVSS v2 Score 6.8
Products affected by CVE-2019-3864
-
-
cpe:2.3:a:redhat:quay:1.12.0
-
cpe:2.3:a:redhat:quay:1.13.0
-
cpe:2.3:a:redhat:quay:1.13.1
-
cpe:2.3:a:redhat:quay:1.13.2
-
cpe:2.3:a:redhat:quay:1.13.3
-
cpe:2.3:a:redhat:quay:1.14.0
-
cpe:2.3:a:redhat:quay:1.14.1
-
cpe:2.3:a:redhat:quay:1.15.0
-
cpe:2.3:a:redhat:quay:1.15.2
-
cpe:2.3:a:redhat:quay:1.15.3
-
cpe:2.3:a:redhat:quay:1.15.4
-
cpe:2.3:a:redhat:quay:1.15.5
-
cpe:2.3:a:redhat:quay:1.16.0
-
cpe:2.3:a:redhat:quay:1.16.1
-
cpe:2.3:a:redhat:quay:1.16.2
-
cpe:2.3:a:redhat:quay:1.16.3
-
cpe:2.3:a:redhat:quay:1.16.4
-
cpe:2.3:a:redhat:quay:1.16.5
-
cpe:2.3:a:redhat:quay:1.16.6
-
cpe:2.3:a:redhat:quay:1.17.0
-
cpe:2.3:a:redhat:quay:1.17.1
-
cpe:2.3:a:redhat:quay:1.18.0
-
cpe:2.3:a:redhat:quay:1.18.1
-
cpe:2.3:a:redhat:quay:2.0.0
-
cpe:2.3:a:redhat:quay:2.0.1
-
cpe:2.3:a:redhat:quay:2.0.2
-
cpe:2.3:a:redhat:quay:2.0.3
-
cpe:2.3:a:redhat:quay:2.0.4
-
cpe:2.3:a:redhat:quay:2.0.5
-
cpe:2.3:a:redhat:quay:2.1.0
-
cpe:2.3:a:redhat:quay:2.2.0
-
cpe:2.3:a:redhat:quay:2.3.0
-
cpe:2.3:a:redhat:quay:2.3.1
-
cpe:2.3:a:redhat:quay:2.3.2
-
cpe:2.3:a:redhat:quay:2.3.3
-
cpe:2.3:a:redhat:quay:2.3.4
-
cpe:2.3:a:redhat:quay:2.4.0
-
cpe:2.3:a:redhat:quay:2.5.0
-
cpe:2.3:a:redhat:quay:2.6.0
-
cpe:2.3:a:redhat:quay:2.6.1
-
cpe:2.3:a:redhat:quay:2.6.2
-
cpe:2.3:a:redhat:quay:2.7.0
-
cpe:2.3:a:redhat:quay:2.8.0
-
cpe:2.3:a:redhat:quay:2.9.0
-
cpe:2.3:a:redhat:quay:2.9.1
-
cpe:2.3:a:redhat:quay:2.9.2
-
cpe:2.3:a:redhat:quay:2.9.3
-
cpe:2.3:a:redhat:quay:2.9.4
-
cpe:2.3:a:redhat:quay:2.9.5