CVE-2024-10082

HIGH

CodeChecker <6.24.1 - Privilege Escalation

Title source: llm
STIX 2.1

Description

CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Authentication method confusion allows logging in as the built-in root user from an external service. The built-in root user up until 6.24.1 is generated in a weak manner, cannot be disabled, and has universal access.This vulnerability allows an attacker who can create an account on an enabled external authentication service, to log in as the root user, and access and control everything that can be controlled via the web interface. The attacker needs to acquire the username of the root user to be successful. This issue affects CodeChecker: through 6.24.1.

Scores

CVSS v3 8.7
EPSS 0.0039
EPSS Percentile 60.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-305 CWE-330 CWE-842
Status published
Products (2)
ericsson/codechecker < 6.24.2
pypi/codechecker 0 - 6.24.2PyPI
Published Nov 06, 2024
Tracked Since Feb 18, 2026