CVE-2023-38337 – rswag
Package
Manager: gem
Name: rswag
Vulnerable Version: >=0 <2.10.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00186 pctl0.4059
Details
rswag vulnerable to arbitrary JSON and YAML file read via directory traversal rswag before 2.10.1 allows remote attackers to read arbitrary JSON and YAML files via directory traversal, because rswag-api can expose a file that is not the OpenAPI (or Swagger) specification file of a project.
Metadata
Created: 2023-07-15T00:30:34Z
Modified: 2023-07-27T16:11:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-vc79-65pr-q82v/GHSA-vc79-65pr-q82v.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-vc79-65pr-q82v
Finding: F063
Auto approve: 1