CVE-2020-27831
quay: email notifications authorization bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in Red Hat Quay, where it does not properly protect the authorization token when authorizing email addresses for repository email notifications. This flaw allows an attacker to add email addresses they do not own to repository notifications.
Se encontró un fallo en Red Hat Quay, donde no protege apropiadamente el token de autorización cuando se autorizan direcciones de correo electrónico para notificaciones de correo electrónico del repositorio. Este fallo permite a un atacante agregar direcciones de correo electrónico que no son de su propiedad a las notificaciones del repositorio
This release of Red Hat Quay v3.3.3 includes: Security Update: quay: persistent XSS in repository notification display quay: email notifications authorization bypass. Issues addressed include bypass and cross site scripting vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-10-27 CVE Reserved
- 2021-01-11 CVE Published
- 2024-08-04 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-284: Improper Access Control
- CWE-522: Insufficiently Protected Credentials
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1905758 | 2021-01-11 | |
https://access.redhat.com/security/cve/CVE-2020-27831 | 2021-01-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Quay Search vendor "Redhat" for product "Quay" | >= 3.0.0 < 3.3.3 Search vendor "Redhat" for product "Quay" and version " >= 3.0.0 < 3.3.3" | - |
Affected
|