Описание
Denial of Service in http-swagger
Impact
Allows an attacker to perform a DOS attack consisting of memory exhaustion on the host system.
Patches
Yes. Please upgrade to v1.2.6.
Workarounds
A workaround is to restrict the path prefix to the "GET" method. As shown below
References
Reporter dongguangli from https://www.huoxian.cn/ company
For more information
If you have any questions or comments about this advisory:
- Open an issue in http-swagger
Ссылки
- https://github.com/swaggo/http-swagger/security/advisories/GHSA-xg75-q3q5-cqmv
- https://nvd.nist.gov/vuln/detail/CVE-2022-24863
- https://github.com/swaggo/http-swagger/pull/62
- https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e
- https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html
- https://github.com/swaggo/http-swagger/releases/tag/v1.2.6
Пакеты
github.com/swaggo/http-swagger
< 1.2.6
1.2.6
Связанные уязвимости
http-swagger is an open source wrapper to automatically generate RESTful API documentation with Swagger 2.0. In versions of http-swagger prior to 1.2.6 an attacker may perform a denial of service attack consisting of memory exhaustion on the host system. The cause of the memory exhaustion is down to improper handling of http methods. Users are advised to upgrade. Users unable to upgrade may to restrict the path prefix to the "GET" method as a workaround.
http-swagger is an open source wrapper to automatically generate RESTful API documentation with Swagger 2.0. In versions of http-swagger prior to 1.2.6 an attacker may perform a denial of service attack consisting of memory exhaustion on the host system. The cause of the memory exhaustion is down to improper handling of http methods. Users are advised to upgrade. Users unable to upgrade may to restrict the path prefix to the "GET" method as a workaround.