CVE-2017-1000207 – io.swagger:swagger-codegen
Package
Manager: maven
Name: io.swagger:swagger-codegen
Vulnerable Version: >=0 <2.2.2
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00423 pctl0.61342
Details
Deserialization of Untrusted Data in swagger-codegen A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
Metadata
Created: 2018-10-19T16:46:30Z
Modified: 2022-09-14T19:14:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-vgvf-9jh3-fg75/GHSA-vgvf-9jh3-fg75.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-vgvf-9jh3-fg75
Finding: F096
Auto approve: 1