CVE-2019-17495: Cross-site scripting in Swagger-UI
(updated )
A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that @import within the JSON data was a functional attack method.
References
- github.com/advisories/GHSA-c427-hjc3-wrfw
- github.com/springfox/springfox/commit/26f72f0d16b166e12c20255a4ee907dc10685cf8
- github.com/swagger-api/swagger-ui
- github.com/swagger-api/swagger-ui/releases/tag/v3.23.11
- github.com/tarantula-team/CSS-injection-in-Swagger-UI
- lists.apache.org/thread.html/r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91@%3Ccommits.airflow.apache.org%3E
- lists.apache.org/thread.html/r3acb7e494cf1aab99b6784b7c5bbddfd0d4f8a484ab534c3a61ef9cf@%3Ccommits.airflow.apache.org%3E
- lists.apache.org/thread.html/r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96@%3Ccommits.airflow.apache.org%3E
- lists.apache.org/thread.html/r853ffeb915a400f899de78124d4e0d77a19379d2e11bf8f4e98c624f@%3Ccommits.airflow.apache.org%3E
- lists.apache.org/thread.html/ref70b940c4f69560d29d6ba792d6c82865e74de3dcad4c92d99b1f8f@%3Ccommits.airflow.apache.org%3E
- nvd.nist.gov/vuln/detail/CVE-2019-17495
- security.snyk.io/vuln/maven?search=CVE-2019-17495
- www.oracle.com/security-alerts/cpuApr2021.html
- www.oracle.com/security-alerts/cpujan2022.html
- www.oracle.com/security-alerts/cpujul2022.html
- www.oracle.com/security-alerts/cpuoct2020.html
Detect and mitigate CVE-2019-17495 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →