First published: Thu Dec 05 2024(Updated: )
A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Quarkus RESTEasy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12225 has a medium severity rating due to the potential for unauthorized access through default REST endpoints.
To fix CVE-2024-12225, ensure that you customize the default REST endpoints and implement proper access controls.
CVE-2024-12225 affects the Quarkus WebAuthn module within Red Hat Quarkus.
CVE-2024-12225 is a security vulnerability related to improper endpoint management and authorization.
Patches for CVE-2024-12225 should be checked in the latest updates of Red Hat Quarkus.