{"vulnerability": "CVE-2024-12225", "sightings": [{"uuid": "f87503d8-d200-4b44-95b0-8cd697f738e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12225", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lojwinmu3w22", "content": "", "creation_timestamp": "2025-05-06T22:26:58.944470Z"}, {"uuid": "812b8aa2-a4cc-47df-89b4-1b7e7f53456a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12225", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15216", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12225\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name.\n\ud83d\udccf Published: 2025-05-06T19:49:16.502Z\n\ud83d\udccf Modified: 2025-05-06T19:49:16.502Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-12225\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2330484", "creation_timestamp": "2025-05-06T20:21:20.000000Z"}, {"uuid": "ce286893-69c3-477f-a99c-f37e9d76fd32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12225", "type": "seen", "source": "https://t.me/cvedetector/24656", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12225 - Quarkus WebAuthn Default Endpoints Information Disclosure and Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-12225 \nPublished : May 6, 2025, 8:15 p.m. | 2\u00a0hours ago \nDescription : A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T00:31:32.000000Z"}]}