cve/2024/CVE-2024-28120.md
2024-05-25 21:48:12 +02:00

20 lines
1.3 KiB
Markdown

### [CVE-2024-28120](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28120)
![](https://img.shields.io/static/v1?label=Product&message=codeium-chrome&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%201.2.52%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%3A%20Improper%20Access%20Control&color=brighgreen)
### Description
codeium-chrome is an open source code completion plugin for the chrome web browser. The service worker of the codeium-chrome extension doesn't check the sender when receiving an external message. This allows an attacker to host a website that will steal the user's Codeium api-key, and thus impersonate the user on the backend autocomplete server. This issue has not been addressed. Users are advised to monitor the usage of their API key.
### POC
#### Reference
- https://github.com/Exafunction/codeium-chrome/security/advisories/GHSA-8c7j-2h97-q63p
- https://securitylab.github.com/advisories/GHSL-2024-027_GHSL-2024-028_codeium-chrome
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds