
CVE-2022-3918
https://notcve.org/view.php?id=CVE-2022-3918
20 Jan 2023 — A program using FoundationNetworking in swift-corelibs-foundation is potentially vulnerable to CRLF ( ) injection in URLRequest headers. In this vulnerability, a client can insert one or several CRLF sequences into a URLRequest header value. When that request is sent via URLSession to an HTTP server, the server may interpret the content after the CRLF as extra headers, or even a second request. For example, consider a URLRequest to http://example.com/ with the GET method. Suppose we set the URLRequest heade... • https://github.com/apple/swift-corelibs-foundation/security/advisories/GHSA-4pp3-mpf2-rj63 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2022-3252
https://notcve.org/view.php?id=CVE-2022-3252
21 Sep 2022 — Improper detection of complete HTTP body decompression SwiftNIO Extras provides a pair of helpers for transparently decompressing received HTTP request or response bodies. These two objects (HTTPRequestDecompressor and HTTPResponseDecompressor) both failed to detect when the decompressed body was considered complete. If trailing junk data was appended to the HTTP message body, the code would repeatedly attempt to decompress this data and fail. This would lead to an infinite loop making no forward progress, ... • https://github.com/apple/swift-nio-extras/security/advisories/GHSA-773g-x274-8qmf • CWE-606: Unchecked Input for Loop Condition CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2022-1642
https://notcve.org/view.php?id=CVE-2022-1642
16 Jun 2022 — A program using swift-corelibs-foundation is vulnerable to a denial of service attack caused by a potentially malicious source producing a JSON document containing a type mismatch. This vulnerability is caused by the interaction between a deserialization mechanism offered by the Swift standard library, the Codable protocol; and the JSONDecoder class offered by swift-corelibs-foundation, which can deserialize types that adopt the Codable protocol based on the content of a provided JSON document. When a type ... • https://github.com/apple/swift-corelibs-foundation/security/advisories/GHSA-239c-6cv2-wwx8 • CWE-241: Improper Handling of Unexpected Data Type CWE-351: Insufficient Type Distinction CWE-704: Incorrect Type Conversion or Cast •

CVE-2020-36486
https://notcve.org/view.php?id=CVE-2020-36486
22 Oct 2021 — Swift File Transfer Mobile v1.1.2 and below was discovered to contain a cross-site scripting (XSS) vulnerability via the 'path' parameter of the 'list' and 'download' exception-handling. Se ha detectado que Swift File Transfer Mobile versión v1.1.2 y por debajo, contienen una vulnerabilidad de tipo cross-site scripting (XSS) por medio del parámetro "path" del manejo de excepciones "list" y "download" • https://www.vulnerability-lab.com/get_content.php?id=2205 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-28789
https://notcve.org/view.php?id=CVE-2021-28789
18 Mar 2021 — The unofficial apple/swift-format extension before 1.1.2 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted apple-swift-format.path configuration value that triggers execution upon opening the workspace. La extensión apple/swift-format no oficial versiones anteriores a 1.1.2 para Visual Studio Code, permite a atacantes remotos ejecutar código arbitrario mediante la construcción de un espacio de trabajo malicioso con un valor de confi... • https://github.com/vknabel/vscode-apple-swift-format/releases/tag/1.1.2 •

CVE-2020-9861
https://notcve.org/view.php?id=CVE-2020-9861
02 Nov 2020 — A stack overflow issue existed in Swift for Linux. The issue was addressed with improved input validation for dealing with deeply nested malicious JSON input. Se presentó un problema de desbordamiento de pila en Swift para Linux. El problema se abordó con una comprobación de entrada mejorada para tratar entradas JSON maliciosas anidadas de forma profunda • https://forums.swift.org/t/swift-5-1-5-for-linux-jsonserialization-limit-recursion-when-parsing/34514 • CWE-674: Uncontrolled Recursion •

CVE-2019-8790 – Apple Security Advisory 2019-10-11-1
https://notcve.org/view.php?id=CVE-2019-8790
14 Oct 2019 — This issue was addresses by updating incorrect URLSession file descriptors management logic to match Swift 5.0. This issue is fixed in Swift 5.1.1 for Ubuntu. Incorrect management of file descriptors in URLSession could lead to inadvertent data disclosure. Este problema se abordó al actualizar la lógica de administración de descriptores de archivo URLSession incorrecta para que coincida con Swift versión 5.0. Este problema se corrigió en Swift versión 5.1.1 para Ubuntu. • https://support.apple.com/en-us/HT210647 • CWE-922: Insecure Storage of Sensitive Information •

CVE-2018-4220 – Apple Security Advisory 2018-05-04-1
https://notcve.org/view.php?id=CVE-2018-4220
05 May 2018 — An issue was discovered in certain Apple products. Swift before 4.1.1 Security Update 2018-001 is affected. The issue involves the "Swift for Ubuntu" component. It allows attackers to execute arbitrary code in a privileged context because write and execute permissions are enabled during library loading. Se ha descubierto un problema en algunos productos Apple. • http://www.securityfocus.com/bid/104085 • CWE-732: Incorrect Permission Assignment for Critical Resource •