Safety vulnerability ID: 71853
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Zip files uploaded to the server endpoint of `CodeChecker store` are not properly sanitized. An attacker, using a path traversal attack, can load and display files on the machine of `CodeChecker server`. The vulnerable endpoint is `/Default/v6.53/CodeCheckerService@massStoreRun`. The path traversal vulnerability allows reading data on the machine of the `CodeChecker server`, with the same permission level as the `CodeChecker server`. The attack requires a user account on the `CodeChecker server`, with permission to store to a server, and view the stored report. This vulnerability has been patched in version 6.23.
Latest version: 6.24.4
CodeChecker is an analyzer tooling, defect database and viewer extension
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application