
CVE-2021-21363 – Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory
https://notcve.org/view.php?id=CVE-2021-21363
11 Mar 2021 — swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary... • https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89 • CWE-378: Creation of Temporary File With Insecure Permissions CWE-379: Creation of Temporary File in Directory with Insecure Permissions •

CVE-2021-21364 – Generated Code Contains Local Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2021-21364
11 Mar 2021 — swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with... • https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-378: Creation of Temporary File With Insecure Permissions CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2017-1000207
https://notcve.org/view.php?id=CVE-2017-1000207
27 Nov 2017 — A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification. Una vulnerabilidad en la funcionalidad de análisis sintáctico yaml en versione... • https://github.com/swagger-api/swagger-parser/pull/481 • CWE-502: Deserialization of Untrusted Data •

CVE-2017-1000208
https://notcve.org/view.php?id=CVE-2017-1000208
17 Nov 2017 — A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification. Una vulnerabilidad en el componente de análisis sintáctico de yaml de Swagger-Parser (versión 1.0.30 y anteriores... • https://github.com/swagger-api/swagger-parser/releases/tag/v1.0.31 • CWE-502: Deserialization of Untrusted Data •