All the vulnerabilites related to Ericsson - CodeChecker
cve-2024-10082
Vulnerability from cvelistv5
Published
2024-11-06 14:34
Modified
2024-11-06 14:59
Severity ?
EPSS score ?
Summary
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy.
Authentication method confusion allows logging in as the built-in root user from an external service. The built-in root user up until 6.24.1 is generated in a weak manner, cannot be disabled, and has universal access.This vulnerability allows an attacker who can create an account on an enabled external authentication service, to log in as the root user, and access and control everything that can be controlled via the web interface. The attacker needs to acquire the username of the root user to be successful.
This issue affects CodeChecker: through 6.24.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Ericsson/codechecker/security/advisories/GHSA-fpm5-2wcj-vfr7 | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Ericsson | CodeChecker |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ericsson:codechecker:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "codechecker", "vendor": "ericsson", "versions": [ { "lessThanOrEqual": "6.24.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-10082", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T14:54:02.741372Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T14:59:50.972Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CodeChecker", "vendor": "Ericsson", "versions": [ { "lessThanOrEqual": "6.24.1", "status": "affected", "version": "0", "versionType": "python" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \u003c/span\u003e\u003cbr\u003e\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAuthentication method confusion allows logging in as the built-in root user from an external service. The built-in root user up until 6.24.1 is generated in a weak manner, cannot be disabled, and has universal access.\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis vulnerability allows an attacker who can create an account on an enabled external authentication service, to log in as the root user, and access and control everything that can be controlled via the web interface.\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe attacker needs to acquire the username of the root user to be successful.\u003c/span\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis issue affects CodeChecker: through 6.24.1.\u003c/p\u003e" } ], "value": "CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \nAuthentication method confusion allows logging in as the built-in root user from an external service. The built-in root user up until 6.24.1 is generated in a weak manner, cannot be disabled, and has universal access.This vulnerability allows an attacker who can create an account on an enabled external authentication service, to log in as the root user, and access and control everything that can be controlled via the web interface.\u00a0The attacker needs to acquire the username of the root user to be successful.\n\nThis issue affects CodeChecker: through 6.24.1." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "CWE-305", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-330", "description": "CWE-330", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-842", "description": "CWE-842", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-06T14:34:38.263Z", "orgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "shortName": "ERIC" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://github.com/Ericsson/codechecker/security/advisories/GHSA-fpm5-2wcj-vfr7" } ], "source": { "discovery": "INTERNAL" }, "tags": [ "x_open-source" ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "assignerShortName": "ERIC", "cveId": "CVE-2024-10082", "datePublished": "2024-11-06T14:34:38.263Z", "dateReserved": "2024-10-17T12:36:52.749Z", "dateUpdated": "2024-11-06T14:59:50.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49793
Vulnerability from cvelistv5
Published
2024-06-24 17:36
Modified
2024-08-02 22:01
Severity ?
EPSS score ?
Summary
Path traversal in `CodeChecker server` in the endpoint of `CodeChecker store`
References
▼ | URL | Tags |
---|---|---|
https://github.com/Ericsson/codechecker/security/advisories/GHSA-h26w-r4m5-8rrf | x_refsource_CONFIRM | |
https://github.com/Ericsson/codechecker/commit/46bada41e32f3ba0f6011d5c556b579f6dddf07a | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Ericsson | codechecker |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ericsson:codechecker:6.23:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "codechecker", "vendor": "ericsson", "versions": [ { "lessThan": "6.23", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-49793", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-25T14:37:31.808705Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-25T14:42:52.007Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:26.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Ericsson/codechecker/security/advisories/GHSA-h26w-r4m5-8rrf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Ericsson/codechecker/security/advisories/GHSA-h26w-r4m5-8rrf" }, { "name": "https://github.com/Ericsson/codechecker/commit/46bada41e32f3ba0f6011d5c556b579f6dddf07a", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Ericsson/codechecker/commit/46bada41e32f3ba0f6011d5c556b579f6dddf07a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "codechecker", "vendor": "Ericsson", "versions": [ { "status": "affected", "version": "\u003c 6.23.0" } ] } ], "descriptions": [ { "lang": "en", "value": "CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Zip files uploaded to the server endpoint of `CodeChecker store` are not properly sanitized. An attacker, using a path traversal attack, can load and display files on the machine of `CodeChecker server`. The vulnerable endpoint is `/Default/v6.53/CodeCheckerService@massStoreRun`. The path traversal vulnerability allows reading data on the machine of the `CodeChecker server`, with the same permission level as the `CodeChecker server`.\nThe attack requires a user account on the `CodeChecker server`, with permission to store to a server, and view the stored report. This vulnerability has been patched in version 6.23." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-24T17:36:21.827Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Ericsson/codechecker/security/advisories/GHSA-h26w-r4m5-8rrf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Ericsson/codechecker/security/advisories/GHSA-h26w-r4m5-8rrf" }, { "name": "https://github.com/Ericsson/codechecker/commit/46bada41e32f3ba0f6011d5c556b579f6dddf07a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Ericsson/codechecker/commit/46bada41e32f3ba0f6011d5c556b579f6dddf07a" } ], "source": { "advisory": "GHSA-h26w-r4m5-8rrf", "discovery": "UNKNOWN" }, "title": "Path traversal in `CodeChecker server` in the endpoint of `CodeChecker store`" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-49793", "datePublished": "2024-06-24T17:36:21.827Z", "dateReserved": "2023-11-30T13:39:50.863Z", "dateUpdated": "2024-08-02T22:01:26.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44217
Vulnerability from cvelistv5
Published
2022-01-18 15:00
Modified
2024-08-04 04:17
Severity ?
EPSS score ?
Summary
In Ericsson CodeChecker through 6.18.0, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API.
References
▼ | URL | Tags |
---|---|---|
https://codechecker-demo.eastus.cloudapp.azure.com/ | x_refsource_MISC | |
https://user-images.githubusercontent.com/9525971/142965091-e118b012-a7fc-4c2f-ad0c-80aeed6f7ec9.png | x_refsource_MISC | |
https://github.com/Ericsson/codechecker/releases | x_refsource_MISC | |
https://github.com/Hyperkopite/CVE-2021-44217/blob/main/README.md | x_refsource_MISC | |
https://github.com/Ericsson/codechecker/pull/3549 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.836Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://codechecker-demo.eastus.cloudapp.azure.com/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://user-images.githubusercontent.com/9525971/142965091-e118b012-a7fc-4c2f-ad0c-80aeed6f7ec9.png" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Ericsson/codechecker/releases" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Hyperkopite/CVE-2021-44217/blob/main/README.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Ericsson/codechecker/pull/3549" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ericsson CodeChecker through 6.18.0, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-18T15:00:55", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://codechecker-demo.eastus.cloudapp.azure.com/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://user-images.githubusercontent.com/9525971/142965091-e118b012-a7fc-4c2f-ad0c-80aeed6f7ec9.png" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Ericsson/codechecker/releases" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Hyperkopite/CVE-2021-44217/blob/main/README.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Ericsson/codechecker/pull/3549" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-44217", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Ericsson CodeChecker through 6.18.0, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://codechecker-demo.eastus.cloudapp.azure.com/", "refsource": "MISC", "url": "https://codechecker-demo.eastus.cloudapp.azure.com/" }, { "name": "https://user-images.githubusercontent.com/9525971/142965091-e118b012-a7fc-4c2f-ad0c-80aeed6f7ec9.png", "refsource": "MISC", "url": "https://user-images.githubusercontent.com/9525971/142965091-e118b012-a7fc-4c2f-ad0c-80aeed6f7ec9.png" }, { "name": "https://github.com/Ericsson/codechecker/releases", "refsource": "MISC", "url": "https://github.com/Ericsson/codechecker/releases" }, { "name": "https://github.com/Hyperkopite/CVE-2021-44217/blob/main/README.md", "refsource": "MISC", "url": "https://github.com/Hyperkopite/CVE-2021-44217/blob/main/README.md" }, { "name": "https://github.com/Ericsson/codechecker/pull/3549", "refsource": "MISC", "url": "https://github.com/Ericsson/codechecker/pull/3549" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-44217", "datePublished": "2022-01-18T15:00:55", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-08-04T04:17:24.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-10081
Vulnerability from cvelistv5
Published
2024-11-06 14:33
Modified
2024-11-06 15:01
Severity ?
EPSS score ?
Summary
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy.
Authentication bypass occurs when the API URL ends with Authentication. This bypass allows superuser access to all API endpoints other than Authentication. These endpoints include the ability to add, edit, and remove products, among others. All endpoints, apart from the /Authentication is affected by the vulnerability.
This issue affects CodeChecker: through 6.24.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Ericsson/codechecker/security/advisories/GHSA-f3f8-vx3w-hp5q | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Ericsson | CodeChecker |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ericsson:codechecker:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "codechecker", "vendor": "ericsson", "versions": [ { "lessThanOrEqual": "6.24.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-10081", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T15:00:25.469782Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T15:01:01.881Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CodeChecker", "vendor": "Ericsson", "versions": [ { "lessThanOrEqual": "6.24.1", "status": "affected", "version": "0", "versionType": "python" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \u003c/span\u003e\u003cbr\u003e\u003cp\u003eAuthentication bypass occurs when the API URL ends with Authentication. This bypass allows superuser access to all API endpoints other than Authentication. These endpoints include the ability to add, edit, and remove products, among others. \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAll endpoints, apart from the /Authentication is affected by the vulnerability.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis issue affects CodeChecker: through 6.24.1.\u003c/p\u003e\u003cp\u003e\u003c/p\u003e" } ], "value": "CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \nAuthentication bypass occurs when the API URL ends with Authentication. This bypass allows superuser access to all API endpoints other than Authentication. These endpoints include the ability to add, edit, and remove products, among others. All endpoints, apart from the /Authentication is affected by the vulnerability.\n\nThis issue affects CodeChecker: through 6.24.1." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-288", "description": "CWE-288", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-420", "description": "CWE-420", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-06T14:33:52.497Z", "orgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "shortName": "ERIC" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://github.com/Ericsson/codechecker/security/advisories/GHSA-f3f8-vx3w-hp5q" } ], "source": { "discovery": "INTERNAL" }, "tags": [ "x_open-source" ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "assignerShortName": "ERIC", "cveId": "CVE-2024-10081", "datePublished": "2024-11-06T14:33:52.497Z", "dateReserved": "2024-10-17T12:36:50.519Z", "dateUpdated": "2024-11-06T15:01:01.881Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }