Skip to content

Deserialization of Untrusted Data in swagger-codegen

High severity GitHub Reviewed Published Oct 19, 2018 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

maven io.swagger:swagger-codegen (Maven)

Affected versions

< 2.2.2

Patched versions

2.2.2
maven io.swagger:swagger-parser (Maven)
< 1.0.31
1.0.31

Description

A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.

References

Published to the GitHub Advisory Database Oct 19, 2018
Reviewed Jun 16, 2020
Last updated Jan 9, 2023

Severity

High
8.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2017-1000207

GHSA ID

GHSA-vgvf-9jh3-fg75
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.