Unknown
CVE-2023-49793
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-49793
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Zip files uploaded to the server endpoint of CodeChecker store
are not properly sanitized. An attacker, using a path traversal attack, can load and display files on the machine of CodeChecker server
. The vulnerable endpoint is /Default/v6.53/CodeCheckerService@massStoreRun
. The path traversal vulnerability allows reading data on the machine of the CodeChecker server
, with the same permission level as the CodeChecker server
.
The attack requires a user account on the CodeChecker server
, with permission to store to a server, and view the stored report. This vulnerability has been patched in version 6.23.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: