CVE-2024-53829

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53829
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53829.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-53829
Aliases
Published
2025-01-21T15:15:13Z
Modified
2025-04-08T11:13:16.130271Z
Summary
[none]
Details

CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Cross-site request forgery allows an unauthenticated attacker to hijack the authentication of a logged in user, and use the web API with the same permissions, including but not limited to adding, removing or editing products. The attacker needs to know the ID of the available products to modify or delete them. The attacker cannot directly exfiltrate data (view) from CodeChecker, due to being limited to form-based CSRF.

This issue affects CodeChecker: through 6.24.4.

References

Affected packages

Git / github.com/ericsson/codechecker

Affected ranges

Type
GIT
Repo
https://github.com/ericsson/codechecker
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v4.*

v4.0

v5.*

v5.0
v5.1
v5.10
v5.2
v5.3
v5.4
v5.5
v5.6
v5.7
v5.7.1
v5.8
v5.9

v6.*

v6.0
v6.0.1
v6.1
v6.1.1
v6.10.0
v6.12.0
v6.13.0
v6.14.0
v6.15.0
v6.16.0
v6.17.0
v6.18.0
v6.19.0
v6.2
v6.2.1
v6.20.0
v6.21.0
v6.22.0
v6.23.0
v6.23.0-rc1
v6.24.0
v6.24.1
v6.24.2
v6.24.3
v6.24.4
v6.3
v6.4
v6.5
v6.5.1
v6.6.0
v6.7.0
v6.7.1
v6.8.0
v6.8.1
v6.9.0
v6.9.1