PYSEC-2024-238
Vulnerability from pysec - Published: 2024-11-06 15:15 - Updated: 2025-04-08 10:23
VLAI?
Details
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Authentication bypass occurs when the API URL ends with Authentication. This bypass allows superuser access to all API endpoints other than Authentication. These endpoints include the ability to add, edit, and remove products, among others. All endpoints, apart from the /Authentication is affected by the vulnerability.
This issue affects CodeChecker: through 6.24.1.
Impacted products
| Name | purl | codechecker | pkg:pypi/codechecker |
|---|
Aliases
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "codechecker",
"purl": "pkg:pypi/codechecker"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.24.2"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"6.16.0",
"6.16.0a1",
"6.17.0",
"6.18.0",
"6.18.1",
"6.18.2",
"6.19.0",
"6.19.1",
"6.20.0",
"6.20.0rc1",
"6.21.0",
"6.21.0rc1",
"6.22.0",
"6.22.0rc1",
"6.22.1",
"6.22.2",
"6.22.2.post1",
"6.23.0",
"6.23.0rc2",
"6.23.1",
"6.24.0",
"6.24.1"
]
}
],
"aliases": [
"CVE-2024-10081",
"GHSA-f3f8-vx3w-hp5q"
],
"details": "CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \nAuthentication bypass occurs when the API URL ends with Authentication. This bypass allows superuser access to all API endpoints other than Authentication. These endpoints include the ability to add, edit, and remove products, among others. All endpoints, apart from the /Authentication is affected by the vulnerability.\n\nThis issue affects CodeChecker: through 6.24.1.",
"id": "PYSEC-2024-238",
"modified": "2025-04-08T10:23:23.857960+00:00",
"published": "2024-11-06T15:15:11+00:00",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/Ericsson/codechecker/security/advisories/GHSA-f3f8-vx3w-hp5q"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…