CVE-2017-1000207

A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:swagger:swagger-codegen:*:*:*:*:*:*:*:*
cpe:2.3:a:swagger:swagger-parser:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:04

Type Values Removed Values Added
References () https://github.com/swagger-api/swagger-parser/pull/481 - Issue Tracking () https://github.com/swagger-api/swagger-parser/pull/481 - Issue Tracking
References () https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208 - Third Party Advisory () https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208 - Third Party Advisory

Information

Published : 2017-11-27 15:29

Updated : 2024-11-21 03:04


NVD link : CVE-2017-1000207

Mitre link : CVE-2017-1000207

CVE.ORG link : CVE-2017-1000207


JSON object : View

Products Affected

swagger

  • swagger-parser
  • swagger-codegen
CWE
CWE-502

Deserialization of Untrusted Data