codechecker@6.20.0 vulnerabilities

CodeChecker is an analyzer tooling, defect database and viewer extension

  • latest version

    6.25.1

  • latest non vulnerable version

  • first published

    3 years ago

  • latest version published

    1 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the codechecker package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Open Redirect

    codechecker is an analyzer tooling, defect database and viewer extension

    Affected versions of this package are vulnerable to Open Redirect due to improper sanitization of URL path segments after the product name. An attacker can redirect users to a malicious website by crafting a URL that includes multiple slashes and an attacker-controlled domain.

    How to fix Open Redirect?

    Upgrade codechecker to version 6.25.0 or higher.

    [,6.25.0)
    • M
    Cross-site Request Forgery (CSRF)

    codechecker is an analyzer tooling, defect database and viewer extension

    Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to missing security attributes from the session cookie.

    How to fix Cross-site Request Forgery (CSRF)?

    Upgrade codechecker to version 6.25.0 or higher.

    [,6.25.0)
    • C
    Authentication Bypass by Primary Weakness

    codechecker is an analyzer tooling, defect database and viewer extension

    Affected versions of this package are vulnerable to Authentication Bypass by Primary Weakness in the form of giving the unremovable auto-generated root user superuser privileges by default. An attacker in possession of this username can control everything that can be controlled via the web interface, and can create an account on an enabled external service.

    How to fix Authentication Bypass by Primary Weakness?

    Upgrade codechecker to version 6.24.2 or higher.

    [,6.24.2)
    • C
    Authentication Bypass Using an Alternate Path or Channel

    codechecker is an analyzer tooling, defect database and viewer extension

    Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel due to improperly parsing the endpoint path, which allows bypassing authentication on all but the /Authentication endpoint. An attacker can gain superuser access to these endpoints to query, add, edit, and delete products.

    How to fix Authentication Bypass Using an Alternate Path or Channel?

    Upgrade codechecker to version 6.24.2 or higher.

    [,6.24.2)
    • H
    Directory Traversal

    codechecker is an analyzer tooling, defect database and viewer extension

    Affected versions of this package are vulnerable to Directory Traversal due to improperly sanitized ZIP files, that are uploaded to the server-side endpoint handling a CodeChecker store. An attacker can make the CodeChecker server load and display files from an arbitrary location on the server machine.

    Note: If the CodeChecker server is run with authentication enabled (not the default configuration), then the attack requires a valid user account on the CodeChecker server, with the permission to store to a database and view the stored reports.

    How to fix Directory Traversal?

    Upgrade codechecker to version 6.23.0 or higher.

    [,6.23.0)