Описание
A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
Ссылки
- Issue Tracking
- Third Party Advisory
- Issue Tracking
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.2.2 (включая)Версия до 1.0.30 (включая)
Одно из
cpe:2.3:a:swagger:swagger-codegen:*:*:*:*:*:*:*:*
cpe:2.3:a:swagger:swagger-parser:*:*:*:*:*:*:*:*
EPSS
Процентиль: 62%
0.00423
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-502
Связанные уязвимости
CVSS3: 8.8
github
больше 7 лет назад
Deserialization of Untrusted Data in swagger-codegen
EPSS
Процентиль: 62%
0.00423
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-502