CVE-2019-17495 (High) detected in swagger-ui-standalone-preset-3.23.9.js
mend-bolt-for-github opened this issue · 1 comments
CVE-2019-17495 - High Severity Vulnerability
Vulnerable Library - swagger-ui-standalone-preset-3.23.9.js
Swagger UI is a dependency-free collection of HTML, JavaScript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API
Library home page: https://cdnjs.cloudflare.com/ajax/libs/swagger-ui/3.23.9/swagger-ui-standalone-preset.js
Path to dependency file: tornado-swagger/tornado_swagger/swagger_ui/ui.html
Path to vulnerable library: tornado-swagger/tornado_swagger/swagger_ui/ui.html
Dependency Hierarchy:
- ❌ swagger-ui-standalone-preset-3.23.9.js (Vulnerable Library)
Vulnerability Details
A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that <style>@import within the JSON data was a functional attack method.
Publish Date: 2019-10-10
URL: CVE-2019-17495
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17495
Release Date: 2019-10-10
Fix Resolution: 3.23.11
Step up your Open Source Security Game with WhiteSource here
Fixed in #36