Untriaged
Permalink
CVE-2024-12225
9.1 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): NONE
Io.quarkus:quarkus-security-webauthn: quarkus webauthn unexpected authentication bypass
A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name.
References
- https://access.redhat.com/security/cve/CVE-2024-12225 x_refsource_REDHAT vdb-entry
- RHBZ#2330484 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12225 x_refsource_REDHAT vdb-entry
- RHBZ#2330484 issue-tracking x_refsource_REDHAT
- RHBZ#2330484 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12225 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2024-12225 x_refsource_REDHAT vdb-entry
- RHBZ#2330484 issue-tracking x_refsource_REDHAT
Affected products
quarkus
- <3.15.3.1
io.quarkus:quarkus-security-webauthn
Package maintainers
-
@vinetos vinetos <contact+git@vinetos.fr>