logo

CVE-2023-38337 rswag

Package

Manager: gem
Name: rswag
Vulnerable Version: >=0 <2.10.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00186 pctl0.4059

Details

rswag vulnerable to arbitrary JSON and YAML file read via directory traversal rswag before 2.10.1 allows remote attackers to read arbitrary JSON and YAML files via directory traversal, because rswag-api can expose a file that is not the OpenAPI (or Swagger) specification file of a project.

Metadata

Created: 2023-07-15T00:30:34Z
Modified: 2023-07-27T16:11:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-vc79-65pr-q82v/GHSA-vc79-65pr-q82v.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-vc79-65pr-q82v
Finding: F063
Auto approve: 1