mrk-andreev/tornado-swagger

CVE-2019-17495 (High) detected in swagger-ui-standalone-preset-3.23.9.js

mend-bolt-for-github opened this issue · 1 comments

CVE-2019-17495 - High Severity Vulnerability

Vulnerable Library - swagger-ui-standalone-preset-3.23.9.js

Swagger UI is a dependency-free collection of HTML, JavaScript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API

Library home page: https://cdnjs.cloudflare.com/ajax/libs/swagger-ui/3.23.9/swagger-ui-standalone-preset.js

Path to dependency file: tornado-swagger/tornado_swagger/swagger_ui/ui.html

Path to vulnerable library: tornado-swagger/tornado_swagger/swagger_ui/ui.html

Dependency Hierarchy:

  • swagger-ui-standalone-preset-3.23.9.js (Vulnerable Library)

Vulnerability Details

A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that <style>@import within the JSON data was a functional attack method.

Publish Date: 2019-10-10

URL: CVE-2019-17495

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17495

Release Date: 2019-10-10

Fix Resolution: 3.23.11


Step up your Open Source Security Game with WhiteSource here

Fixed in #36