Safety vulnerability ID: 78816
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of the codechecker package are vulnerable to Authentication Method Confusion due to improper validation of authentication sources for the built-in root user account. The vulnerability exists in versions through 6.24.1, where an auto-generated superuser account with a weakly generated username is stored in the root.user file cannot be disabled and is unconditionally granted superuser permissions regardless of the authentication service used. An attacker who can create an account on any enabled external authentication service (such as LDAP or PAM) can exploit this vulnerability by registering with the same username as the built-in root user, thereby gaining full administrative access to the CodeChecker instance and control over all functionality accessible via the web interface.
Latest version: 6.26.0
CodeChecker is an analyzer tooling, defect database and viewer extension
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application