Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xg75-q3q5-cqmv

Опубликовано: 22 апр. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Denial of Service in http-swagger

Impact

Allows an attacker to perform a DOS attack consisting of memory exhaustion on the host system.

Patches

Yes. Please upgrade to v1.2.6.

Workarounds

A workaround is to restrict the path prefix to the "GET" method. As shown below

func main() { r := mux.NewRouter() r.PathPrefix("/swagger/").Handler(httpSwagger.Handler( httpSwagger.URL("http://localhost:1323/swagger/doc.json"), //The url pointing to API definition httpSwagger.DeepLinking(true), httpSwagger.DocExpansion("none"), httpSwagger.DomID("#swagger-ui"), )).Methods(http.MethodGet)

References

Reporter dongguangli from https://www.huoxian.cn/ company

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

github.com/swaggo/http-swagger

go
Затронутые версииВерсия исправления

< 1.2.6

1.2.6

EPSS

Процентиль: 68%
0.00569
Низкий

7.5 High

CVSS3

Дефекты

CWE-400
CWE-755

Связанные уязвимости

CVSS3: 7.5
redhat
почти 4 года назад

http-swagger is an open source wrapper to automatically generate RESTful API documentation with Swagger 2.0. In versions of http-swagger prior to 1.2.6 an attacker may perform a denial of service attack consisting of memory exhaustion on the host system. The cause of the memory exhaustion is down to improper handling of http methods. Users are advised to upgrade. Users unable to upgrade may to restrict the path prefix to the "GET" method as a workaround.

CVSS3: 7.5
nvd
почти 4 года назад

http-swagger is an open source wrapper to automatically generate RESTful API documentation with Swagger 2.0. In versions of http-swagger prior to 1.2.6 an attacker may perform a denial of service attack consisting of memory exhaustion on the host system. The cause of the memory exhaustion is down to improper handling of http methods. Users are advised to upgrade. Users unable to upgrade may to restrict the path prefix to the "GET" method as a workaround.

EPSS

Процентиль: 68%
0.00569
Низкий

7.5 High

CVSS3

Дефекты

CWE-400
CWE-755