GMS-2020-785: Cross-Site Scripting in swagger-ui
(updated )
Affected versions of swagger-ui
are vulnerable to cross-site scripting. This vulnerability exists because swagger-ui
automatically executes external Javascript that is loaded in via the url
query string parameter when a Content-Type: application/javascript
header is included.
An attacker can create a server that replies with a malicious script and the proper content-type, and then craft a swagger-ui
URL that includes the location to their server/script in the url
query string parameter. When viewed, such a link would execute the attacker’s malicious script.
Recommendation
Update to 2.2.1 or later.
References
Detect and mitigate GMS-2020-785 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →