4 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

http-swagger is an open source wrapper to automatically generate RESTful API documentation with Swagger 2.0. In versions of http-swagger prior to 1.2.6 an attacker may perform a denial of service attack consisting of memory exhaustion on the host system. The cause of the memory exhaustion is down to improper handling of http methods. Users are advised to upgrade. Users unable to upgrade may to restrict the path prefix to the "GET" method as a workaround. http-swagger es un wrapper de código abierto para generar automáticamente la documentación de la API RESTful con Swagger versión 2.0. • https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e https://github.com/swaggo/http-swagger/pull/62 https://github.com/swaggo/http-swagger/releases/tag/v1.2.6 https://github.com/swaggo/http-swagger/security/advisories/GHSA-xg75-q3q5-cqmv • CWE-400: Uncontrolled Resource Consumption CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Embed Swagger WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient escaping/sanitization and validation via the url parameter found in the ~/swagger-iframe.php file which allows attackers to inject arbitrary web scripts onto the page, in versions up to and including 1.0.0. El plugin Embed Swagger de WordPress es vulnerable a un ataque de tipo Cross-Site Scripting Reflejado debido a un escape/saneo y comprobación insuficientes por medio del parámetro url encontrado en el archivo ~/swagger-iframe.php que permite a atacantes inyectar scripts web arbitrarios en la página, en versiones hasta la 1.0.0 incluyéndola • https://gist.github.com/Xib3rR4dAr/4b3ea7960914e23c3a875b973a5b37a3 https://plugins.trac.wordpress.org/browser/embed-swagger/trunk/swagger-iframe.php#L59 https://www.wordfence.com/vulnerability-advisories/#CVE-2022-0381 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification. Una vulnerabilidad en la funcionalidad de análisis sintáctico yaml en versiones iguales o anteriores a la 1.0.30 de Swagger-Parser y las versiones iguales o anteriores a la 2.2.2 de Swagger codegen resulta en la ejecución de código arbitrario cuando se analiza una especificación yaml Open-API maliciosamente manipulada. En este caso en particular, afecta a los comandos "generate" y "validate" en swagger-codegen (versiones 2.2.2 y anteriores) y puede provocar que se ejecute código arbitrario cuando se utilicen estos comandos en una especificación de yaml especialmente manipulada. • https://github.com/swagger-api/swagger-parser/pull/481 https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208 • CWE-502: Deserialization of Untrusted Data •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification. Una vulnerabilidad en el componente de análisis sintáctico de yaml de Swagger-Parser (versión 1.0.30 y anteriores) resulta en la ejecución de código arbitrario cuando se analiza sintácticamente una especificación Open-API de yaml manipulada de manera maliciosa. En este caso en particular, afecta a los comandos "generate" y "validate" en swagger-codegen (versiones 2.2.2 y anteriores) y puede provocar que se ejecute código arbitrario cuando se utilicen estos comandos en una especificación de yaml especialmente manipulada. • https://github.com/swagger-api/swagger-parser/releases/tag/v1.0.31 https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208 • CWE-502: Deserialization of Untrusted Data •