Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-12225

Опубликовано: 28 фев. 2025
Источник: redhat
CVSS3: 9.1
EPSS Низкий

Описание

A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name.

Отчет

The Red Hat build of Quarkus does not support the quarkus-security-webauthn module.

Меры по смягчению последствий

It is possible to mitigate this issue by disabling the default endpoints after creating a custom one. For example with the call for: import io.vertx.ext.web.Router; import jakarta.enterprise.event.Observes; public class Startup { public void init(@Observes Router router) { System.err.println("Securing WebAuthn default controller"); router.post("/q/webauthn/callback").order(0).handler(rc -> rc.fail(404)); } }

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of Quarkusio.quarkus:quarkus-security-webauthnNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-288
https://bugzilla.redhat.com/show_bug.cgi?id=2330484io.quarkus:quarkus-security-webauthn: Quarkus WebAuthn Unexpected Authentication Bypass

EPSS

Процентиль: 20%
0.00063
Низкий

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.1
nvd
9 месяцев назад

A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name.

CVSS3: 9.1
github
9 месяцев назад

A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name.

EPSS

Процентиль: 20%
0.00063
Низкий

9.1 Critical

CVSS3