Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g839-x3p3-g5fm

Опубликовано: 03 мар. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

CodeChecker open redirect when URL contains multiple slashes after the product name

Summary

CodeChecker versions up to 6.24.5 contain an open redirect vulnerability due to missing protections against multiple slashes after the product name in the URL's path segment. This results in bypassing protections against CVE-2021-28861, leading to the same open redirect pathway.

Details

CodeChecker processes GET requests by first rewriting the path segment of the URL, and then passing the rewritten URL to the webserver framework. When trimming the product name from the URL, no sanitization was performed on the remaining URL, which reintroduced the same issue as CVE-2021-28861, leading to the same open redirect pathway using URLs such as /Default//attacker.com/%2f...

Impact

The vulnerability allows an attacker to create a hyperlink that looks like a legitimate CodeChecker URL, but redirects to an attacker-supplied website when clicked.

Пакеты

Наименование

codechecker

pip
Затронутые версииВерсия исправления

<= 6.24.5

6.24.6

EPSS

Процентиль: 27%
0.00098
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 6.1
nvd
11 месяцев назад

CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. The CodeChecker web server contains an open redirect vulnerability due to missing protections against multiple slashes after the product name in the URL. This results in bypassing the protections against CVE-2021-28861, leading to the same open redirect pathway. This issue affects CodeChecker: through 6.24.5.

EPSS

Процентиль: 27%
0.00098
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-601