8 results (0.010 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A program using FoundationNetworking in swift-corelibs-foundation is potentially vulnerable to CRLF ( ) injection in URLRequest headers. In this vulnerability, a client can insert one or several CRLF sequences into a URLRequest header value. When that request is sent via URLSession to an HTTP server, the server may interpret the content after the CRLF as extra headers, or even a second request. For example, consider a URLRequest to http://example.com/ with the GET method. Suppose we set the URLRequest header "Foo" to the value "Bar Extra-Header: Added GET /other HTTP/1.1". • https://github.com/apple/swift-corelibs-foundation/security/advisories/GHSA-4pp3-mpf2-rj63 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Improper detection of complete HTTP body decompression SwiftNIO Extras provides a pair of helpers for transparently decompressing received HTTP request or response bodies. These two objects (HTTPRequestDecompressor and HTTPResponseDecompressor) both failed to detect when the decompressed body was considered complete. If trailing junk data was appended to the HTTP message body, the code would repeatedly attempt to decompress this data and fail. This would lead to an infinite loop making no forward progress, leading to livelock of the system and denial-of-service. This issue can be triggered by any attacker capable of sending a compressed HTTP message. • https://github.com/apple/swift-nio-extras/security/advisories/GHSA-773g-x274-8qmf • CWE-606: Unchecked Input for Loop Condition CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

A program using swift-corelibs-foundation is vulnerable to a denial of service attack caused by a potentially malicious source producing a JSON document containing a type mismatch. This vulnerability is caused by the interaction between a deserialization mechanism offered by the Swift standard library, the Codable protocol; and the JSONDecoder class offered by swift-corelibs-foundation, which can deserialize types that adopt the Codable protocol based on the content of a provided JSON document. When a type that adopts Codable requests the initialization of a field with an integer value, the JSONDecoder class uses a type-erased container with different accessor methods to attempt and coerce a corresponding JSON value and produce an integer. In the case the JSON value was a numeric literal with a floating-point portion, JSONDecoder used different type-eraser methods during validation than it did during the final casting of the value. The checked casting produces a deterministic crash due to this mismatch. • https://github.com/apple/swift-corelibs-foundation/security/advisories/GHSA-239c-6cv2-wwx8 • CWE-241: Improper Handling of Unexpected Data Type CWE-351: Insufficient Type Distinction CWE-704: Incorrect Type Conversion or Cast •

CVSS: 6.1EPSS: 0%CPEs: 4EXPL: 1

Swift File Transfer Mobile v1.1.2 and below was discovered to contain a cross-site scripting (XSS) vulnerability via the 'path' parameter of the 'list' and 'download' exception-handling. Se ha detectado que Swift File Transfer Mobile versión v1.1.2 y por debajo, contienen una vulnerabilidad de tipo cross-site scripting (XSS) por medio del parámetro "path" del manejo de excepciones "list" y "download" • https://www.vulnerability-lab.com/get_content.php?id=2205 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

The unofficial apple/swift-format extension before 1.1.2 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted apple-swift-format.path configuration value that triggers execution upon opening the workspace. La extensión apple/swift-format no oficial versiones anteriores a 1.1.2 para Visual Studio Code, permite a atacantes remotos ejecutar código arbitrario mediante la construcción de un espacio de trabajo malicioso con un valor de configuración apple-swift-format.path diseñado que desencadena una ejecución tras abrir el espacio de trabajo • https://github.com/vknabel/vscode-apple-swift-format/releases/tag/1.1.2 https://vuln.ryotak.me/advisories/11 •