CVE-2025-1300 – codechecker
Package
Manager: pip
Name: codechecker
Vulnerable Version: >=0 <6.24.6
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
EPSS: 0.00047 pctl0.14152
Details
CodeChecker open redirect when URL contains multiple slashes after the product name Summary --- CodeChecker versions up to 6.24.5 contain an open redirect vulnerability due to missing protections against multiple slashes after the product name in the URL's path segment. This results in bypassing protections against CVE-2021-28861, leading to the same open redirect pathway. Details --- CodeChecker processes GET requests by first rewriting the path segment of the URL, and then passing the rewritten URL to the webserver framework. When trimming the product name from the URL, no sanitization was performed on the remaining URL, which reintroduced the same issue as CVE-2021-28861, leading to the same open redirect pathway using URLs such as `/Default//attacker.com/%2f..`. Impact --- The vulnerability allows an attacker to create a hyperlink that looks like a legitimate CodeChecker URL, but redirects to an attacker-supplied website when clicked.
Metadata
Created: 2025-03-03T19:53:16Z
Modified: 2025-03-03T19:53:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-g839-x3p3-g5fm/GHSA-g839-x3p3-g5fm.json
CWE IDs: ["CWE-601"]
Alternative ID: GHSA-g839-x3p3-g5fm
Finding: F156
Auto approve: 1