io.quarkus:quarkus-security-webauthn@2.11.0.Final vulnerabilities

  • latest version

    3.19.3

  • first published

    2 years ago

  • latest version published

    4 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the io.quarkus:quarkus-security-webauthn package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Authentication Bypass Using an Alternate Path or Channel

    Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel through the default REST endpoints. An attacker can bypass authentication controls and potentially log in as an existing user without proper credentials by exploiting these endpoints. This is only exploitable if custom REST endpoints are provided by developers but the default endpoints are not disabled.

    How to fix Authentication Bypass Using an Alternate Path or Channel?

    There is no fixed version for io.quarkus:quarkus-security-webauthn.

    [0,)
    • M
    Cross-site Scripting (XSS)

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, if the Quarkus Form Authentication session cookie Path attribute is set to /.

    Note: This attack can be prevented with the Quarkus CSRF Prevention feature.

    How to fix Cross-site Scripting (XSS)?

    Upgrade io.quarkus:quarkus-security-webauthn to version 2.13.7.Final or higher.

    [,2.13.7.Final)