You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
CodeChecker is an analyzer tooling, defect database and viewer extension for the
Clang Static Analyzer and Clang Tidy. Zip files uploaded to the server endpoint
of CodeChecker store are not properly sanitized. An attacker, using a path
traversal attack, can load and display files on the machine of CodeChecker server. The vulnerable endpoint is /Default/v6.53/CodeCheckerService@massStoreRun. The path traversal
vulnerability allows reading data on the machine of the CodeChecker server,
with the same permission level as the CodeChecker server. The attack requires
a user account on the `...
Advisory CVE-2023-49793 references a vulnerability in the following Go modules:
Description:
CodeChecker is an analyzer tooling, defect database and viewer extension for the
Clang Static Analyzer and Clang Tidy. Zip files uploaded to the server endpoint
of
CodeChecker store
are not properly sanitized. An attacker, using a pathtraversal attack, can load and display files on the machine of
CodeChecker server
. The vulnerable endpoint is/Default/v6.53/CodeCheckerService@massStoreRun
. The path traversalvulnerability allows reading data on the machine of the
CodeChecker server
,with the same permission level as the
CodeChecker server
. The attack requiresa user account on the `...
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: