CVE-2017-1000208 – io.swagger:swagger-parser
Package
Manager: maven
Name: io.swagger:swagger-parser
Vulnerable Version: >=0 <1.0.31
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00463 pctl0.63341
Details
Deserialization of Untrusted Data in swagger-parser A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
Metadata
Created: 2018-10-19T16:46:41Z
Modified: 2022-09-14T19:14:55Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-q7pf-qr96-2vq5/GHSA-q7pf-qr96-2vq5.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-q7pf-qr96-2vq5
Finding: F096
Auto approve: 1