Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2019-3864

A vulnerability was discovered in all quay-2 versions before quay-3.0.0, in the Quay web GUI where POST requests include a specific parameter which is used as a CSRF token. The token is not refreshed for every request or when a user logged out and in again. An attacker could use a leaked token to gain access to the system using the user's account.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 37.8%
CVSS Severity
CVSS v3 Score 5.4
CVSS v2 Score 6.8
Products affected by CVE-2019-3864
  • Redhat » Quay » Version: N/A
    cpe:2.3:a:redhat:quay:-
  • Redhat » Quay » Version: 1.12.0
    cpe:2.3:a:redhat:quay:1.12.0
  • Redhat » Quay » Version: 1.13.0
    cpe:2.3:a:redhat:quay:1.13.0
  • Redhat » Quay » Version: 1.13.1
    cpe:2.3:a:redhat:quay:1.13.1
  • Redhat » Quay » Version: 1.13.2
    cpe:2.3:a:redhat:quay:1.13.2
  • Redhat » Quay » Version: 1.13.3
    cpe:2.3:a:redhat:quay:1.13.3
  • Redhat » Quay » Version: 1.14.0
    cpe:2.3:a:redhat:quay:1.14.0
  • Redhat » Quay » Version: 1.14.1
    cpe:2.3:a:redhat:quay:1.14.1
  • Redhat » Quay » Version: 1.15.0
    cpe:2.3:a:redhat:quay:1.15.0
  • Redhat » Quay » Version: 1.15.2
    cpe:2.3:a:redhat:quay:1.15.2
  • Redhat » Quay » Version: 1.15.3
    cpe:2.3:a:redhat:quay:1.15.3
  • Redhat » Quay » Version: 1.15.4
    cpe:2.3:a:redhat:quay:1.15.4
  • Redhat » Quay » Version: 1.15.5
    cpe:2.3:a:redhat:quay:1.15.5
  • Redhat » Quay » Version: 1.16.0
    cpe:2.3:a:redhat:quay:1.16.0
  • Redhat » Quay » Version: 1.16.1
    cpe:2.3:a:redhat:quay:1.16.1
  • Redhat » Quay » Version: 1.16.2
    cpe:2.3:a:redhat:quay:1.16.2
  • Redhat » Quay » Version: 1.16.3
    cpe:2.3:a:redhat:quay:1.16.3
  • Redhat » Quay » Version: 1.16.4
    cpe:2.3:a:redhat:quay:1.16.4
  • Redhat » Quay » Version: 1.16.5
    cpe:2.3:a:redhat:quay:1.16.5
  • Redhat » Quay » Version: 1.16.6
    cpe:2.3:a:redhat:quay:1.16.6
  • Redhat » Quay » Version: 1.17.0
    cpe:2.3:a:redhat:quay:1.17.0
  • Redhat » Quay » Version: 1.17.1
    cpe:2.3:a:redhat:quay:1.17.1
  • Redhat » Quay » Version: 1.18.0
    cpe:2.3:a:redhat:quay:1.18.0
  • Redhat » Quay » Version: 1.18.1
    cpe:2.3:a:redhat:quay:1.18.1
  • Redhat » Quay » Version: 2.0.0
    cpe:2.3:a:redhat:quay:2.0.0
  • Redhat » Quay » Version: 2.0.1
    cpe:2.3:a:redhat:quay:2.0.1
  • Redhat » Quay » Version: 2.0.2
    cpe:2.3:a:redhat:quay:2.0.2
  • Redhat » Quay » Version: 2.0.3
    cpe:2.3:a:redhat:quay:2.0.3
  • Redhat » Quay » Version: 2.0.4
    cpe:2.3:a:redhat:quay:2.0.4
  • Redhat » Quay » Version: 2.0.5
    cpe:2.3:a:redhat:quay:2.0.5
  • Redhat » Quay » Version: 2.1.0
    cpe:2.3:a:redhat:quay:2.1.0
  • Redhat » Quay » Version: 2.2.0
    cpe:2.3:a:redhat:quay:2.2.0
  • Redhat » Quay » Version: 2.3.0
    cpe:2.3:a:redhat:quay:2.3.0
  • Redhat » Quay » Version: 2.3.1
    cpe:2.3:a:redhat:quay:2.3.1
  • Redhat » Quay » Version: 2.3.2
    cpe:2.3:a:redhat:quay:2.3.2
  • Redhat » Quay » Version: 2.3.3
    cpe:2.3:a:redhat:quay:2.3.3
  • Redhat » Quay » Version: 2.3.4
    cpe:2.3:a:redhat:quay:2.3.4
  • Redhat » Quay » Version: 2.4.0
    cpe:2.3:a:redhat:quay:2.4.0
  • Redhat » Quay » Version: 2.5.0
    cpe:2.3:a:redhat:quay:2.5.0
  • Redhat » Quay » Version: 2.6.0
    cpe:2.3:a:redhat:quay:2.6.0
  • Redhat » Quay » Version: 2.6.1
    cpe:2.3:a:redhat:quay:2.6.1
  • Redhat » Quay » Version: 2.6.2
    cpe:2.3:a:redhat:quay:2.6.2
  • Redhat » Quay » Version: 2.7.0
    cpe:2.3:a:redhat:quay:2.7.0
  • Redhat » Quay » Version: 2.8.0
    cpe:2.3:a:redhat:quay:2.8.0
  • Redhat » Quay » Version: 2.9.0
    cpe:2.3:a:redhat:quay:2.9.0
  • Redhat » Quay » Version: 2.9.1
    cpe:2.3:a:redhat:quay:2.9.1
  • Redhat » Quay » Version: 2.9.2
    cpe:2.3:a:redhat:quay:2.9.2
  • Redhat » Quay » Version: 2.9.3
    cpe:2.3:a:redhat:quay:2.9.3
  • Redhat » Quay » Version: 2.9.4
    cpe:2.3:a:redhat:quay:2.9.4
  • Redhat » Quay » Version: 2.9.5
    cpe:2.3:a:redhat:quay:2.9.5


Contact Us

Shodan ® - All rights reserved