A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name.
Metrics
Affected Vendors & Products
References
History
Tue, 06 May 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | io.quarkus:quarkus-security-webauthn: Quarkus WebAuthn Unexpected Authentication Bypass | Io.quarkus:quarkus-security-webauthn: quarkus webauthn unexpected authentication bypass |
First Time appeared |
Redhat
Redhat quarkus |
|
CPEs | cpe:/a:redhat:quarkus:3 | |
Vendors & Products |
Redhat
Redhat quarkus |
|
References |
|
Fri, 28 Feb 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name. | |
Title | io.quarkus:quarkus-security-webauthn: Quarkus WebAuthn Unexpected Authentication Bypass | |
Weaknesses | CWE-288 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-05-06T19:49:16.502Z
Updated: 2025-05-06T19:49:16.502Z
Reserved: 2024-12-05T03:01:11.272Z
Link: CVE-2024-12225

No data.

Status : Awaiting Analysis
Published: 2025-05-06T20:15:25.747
Modified: 2025-05-07T14:13:20.483
Link: CVE-2024-12225
