Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2023-26114
Modified
More InfoOfficial Page
Source-report@snyk.io
View Known Exploited Vulnerability (KEV) details
Published At-23 Mar, 2023 | 05:15
Updated At-25 Feb, 2025 | 20:15

Versions of the package code-server before 4.10.1 are vulnerable to Missing Origin Validation in WebSockets handshakes. Exploiting this vulnerability can allow an adversary in specific scenarios to access data from and connect to the code-server instance.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.2HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L
Primary3.19.3CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Secondary3.19.3CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L
Type: Primary
Version: 3.1
Base score: 9.3
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 9.3
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
CPE Matches

coder
coder
>>code-server>>Versions before 4.10.1(exclusive)
cpe:2.3:a:coder:code-server:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1385Secondaryreport@snyk.io
CWE-346Primarynvd@nist.gov
CWE-346Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-1385
Type: Secondary
Source: report@snyk.io
CWE ID: CWE-346
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-346
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/coder/code-server/commit/d477972c68fc8c8e8d610aa7287db87ba90e55c7report@snyk.io
Patch
https://github.com/coder/code-server/releases/tag/v4.10.1report@snyk.io
Release Notes
https://security.snyk.io/vuln/SNYK-JS-CODESERVER-3368148report@snyk.io
Patch
https://github.com/coder/code-server/commit/d477972c68fc8c8e8d610aa7287db87ba90e55c7af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/coder/code-server/releases/tag/v4.10.1af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://security.snyk.io/vuln/SNYK-JS-CODESERVER-3368148af854a3a-2127-422b-91ae-364da2661108
Patch
Hyperlink: https://github.com/coder/code-server/commit/d477972c68fc8c8e8d610aa7287db87ba90e55c7
Source: report@snyk.io
Resource:
Patch
Hyperlink: https://github.com/coder/code-server/releases/tag/v4.10.1
Source: report@snyk.io
Resource:
Release Notes
Hyperlink: https://security.snyk.io/vuln/SNYK-JS-CODESERVER-3368148
Source: report@snyk.io
Resource:
Patch
Hyperlink: https://github.com/coder/code-server/commit/d477972c68fc8c8e8d610aa7287db87ba90e55c7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/coder/code-server/releases/tag/v4.10.1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://security.snyk.io/vuln/SNYK-JS-CODESERVER-3368148
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Change History
0Changes found

Details not found