A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
References
Link | Resource |
---|---|
https://github.com/swagger-api/swagger-parser/releases/tag/v1.0.31 | Release Notes |
https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-11-16 18:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-1000208
Mitre link : CVE-2017-1000208
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
swagger
- swagger-parser
- swagger-codegen