-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Vulnerable Library - swagger-ui-2.2.10.tgz
Swagger UI is a dependency-free collection of HTML, JavaScript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API
Library home page: https://registry.npmjs.org/swagger-ui/-/swagger-ui-2.2.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/swagger-ui/package.json
Found in HEAD commit: 54f4ec10f11c47d2b4050fa804f9d9937154abf7
Vulnerabilities
Vulnerability | Severity | Exploit Maturity | EPSS | Dependency | Type | Fixed in (swagger-ui version) | Remediation Possible** | Reachability | |
---|---|---|---|---|---|---|---|---|---|
CVE-2019-17495 | 9.8 | Not Defined | 13.7% | swagger-ui-2.2.10.tgz | Direct | 3.23.11 | ✅ | ||
WS-2019-0172 | 6.5 | Not Defined | swagger-ui-2.2.10.tgz | Direct | 3.20.9 | ✅ | |||
WS-2019-0236 | 6.1 | Not Defined | swagger-ui-2.2.10.tgz | Direct | N/A | ❌ | |||
WS-2019-0171 | 4.3 | Not Defined | swagger-ui-2.2.10.tgz | Direct | N/A | ❌ | |||
CVE-2018-25031 | 4.3 | Not Defined | 83.600006% | swagger-ui-2.2.10.tgz | Direct | 4.1.3 | ✅ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2019-17495
Vulnerable Library - swagger-ui-2.2.10.tgz
Swagger UI is a dependency-free collection of HTML, JavaScript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API
Library home page: https://registry.npmjs.org/swagger-ui/-/swagger-ui-2.2.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/swagger-ui/package.json
Dependency Hierarchy:
- ❌ swagger-ui-2.2.10.tgz (Vulnerable Library)
Found in HEAD commit: 54f4ec10f11c47d2b4050fa804f9d9937154abf7
Found in base branch: master
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that <style>@import within the JSON data was a functional attack method.
Publish Date: 2019-10-10
URL: CVE-2019-17495
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 13.7%
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2019-10-10
Fix Resolution: 3.23.11
⛑️ Automatic Remediation will be attempted for this issue.
WS-2019-0172
Vulnerable Library - swagger-ui-2.2.10.tgz
Swagger UI is a dependency-free collection of HTML, JavaScript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API
Library home page: https://registry.npmjs.org/swagger-ui/-/swagger-ui-2.2.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/swagger-ui/package.json
Dependency Hierarchy:
- ❌ swagger-ui-2.2.10.tgz (Vulnerable Library)
Found in HEAD commit: 54f4ec10f11c47d2b4050fa804f9d9937154abf7
Found in base branch: master
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
swagger-ui before 3.20.9 fails to sanitize URLs used in the OAuth auth flow, which may allow attackers to execute arbitrary JavaScript. that leads to Cross-Site Scripting
Publish Date: 2019-02-23
URL: WS-2019-0172
Threat Assessment
Exploit Maturity: Not Defined
EPSS:
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/976
Release Date: 2019-02-23
Fix Resolution: 3.20.9
⛑️ Automatic Remediation will be attempted for this issue.
WS-2019-0236
Vulnerable Library - swagger-ui-2.2.10.tgz
Swagger UI is a dependency-free collection of HTML, JavaScript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API
Library home page: https://registry.npmjs.org/swagger-ui/-/swagger-ui-2.2.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/swagger-ui/package.json
Dependency Hierarchy:
- ❌ swagger-ui-2.2.10.tgz (Vulnerable Library)
Found in HEAD commit: 54f4ec10f11c47d2b4050fa804f9d9937154abf7
Found in base branch: master
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
swagger-ui versions before 3.0.13 are vulnerable to XSS when it fails to sanitize YAML files imported from URLs or copied-pasted. This may allow attackers to execute arbitrary JavaScript.
Publish Date: 2017-06-02
URL: WS-2019-0236
Threat Assessment
Exploit Maturity: Not Defined
EPSS:
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
WS-2019-0171
Vulnerable Library - swagger-ui-2.2.10.tgz
Swagger UI is a dependency-free collection of HTML, JavaScript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API
Library home page: https://registry.npmjs.org/swagger-ui/-/swagger-ui-2.2.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/swagger-ui/package.json
Dependency Hierarchy:
- ❌ swagger-ui-2.2.10.tgz (Vulnerable Library)
Found in HEAD commit: 54f4ec10f11c47d2b4050fa804f9d9937154abf7
Found in base branch: master
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
swagger-ui before 3.18.0 has Reverse Tabnapping vulnerability. using target='_blank' in anchor tags, allowing attackers to access window.opener for the original page.
Publish Date: 2018-08-02
URL: WS-2019-0171
Threat Assessment
Exploit Maturity: Not Defined
EPSS:
CVSS 3 Score Details (4.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
CVE-2018-25031
Vulnerable Library - swagger-ui-2.2.10.tgz
Swagger UI is a dependency-free collection of HTML, JavaScript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API
Library home page: https://registry.npmjs.org/swagger-ui/-/swagger-ui-2.2.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/swagger-ui/package.json
Dependency Hierarchy:
- ❌ swagger-ui-2.2.10.tgz (Vulnerable Library)
Found in HEAD commit: 54f4ec10f11c47d2b4050fa804f9d9937154abf7
Found in base branch: master
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Swagger UI 4.1.2 and earlier could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. Note: This was originally claimed to be resolved in 4.1.3. However, third parties have indicated this is not resolved in 4.1.3 and even occurs in that version and possibly others. Converted from WS-2021-0461, on 2022-12-21.
Publish Date: 2022-03-11
URL: CVE-2018-25031
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 83.600006%
CVSS 3 Score Details (4.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-qrmm-w75w-3wpx
Release Date: 2022-03-11
Fix Resolution: 4.1.3
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.