A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
References
Link | Resource |
---|---|
https://github.com/swagger-api/swagger-parser/pull/481 | Issue Tracking |
https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-11-27T15:00:00
Updated: 2017-12-07T18:57:01
Reserved: 2017-11-27T00:00:00
Link: CVE-2017-1000207
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-11-27T15:29:00.303
Modified: 2019-10-03T00:03:26.223
Link: CVE-2017-1000207
JSON object: View
Redhat Information
No data.
CWE