moqui / moqui-runtime

The default runtime directory for Moqui Framework
Other
37 stars 79 forks source link

CVE-2016-1000233 (Medium) detected in swagger-uiv2.1.4 #184

Closed mend-bolt-for-github[bot] closed 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2016-1000233 - Medium Severity Vulnerability

Vulnerable Library - swagger-uiv2.1.4

Swagger UI is a collection of HTML, Javascript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API.

Library home page: https://github.com/swagger-api/swagger-ui.git

Found in HEAD commit: f5e5c8ccc2d14a1a2f4657ec2306e20c51039f21

Found in base branch: master

Vulnerable Source Files (1)

/base-component/tools/screen/toolstatic/lib/swagger-ui/swagger-ui.min.js

Vulnerability Details

swagger-ui before 2.2.1 automatically executes external Javascript that is loaded in via the url query string parameter

Publish Date: 2019-07-11

URL: CVE-2016-1000233

CVSS 3 Score Details (6.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082

Release Date: 2019-07-11

Fix Resolution: 2.2.1


Step up your Open Source Security Game with WhiteSource here

jonesde commented 2 years ago

Fixed with update of Swagger UI to 4.1.3 using CDNJS for JS and CSS files, easier to update and trims the feature of embedded Swagger UI to one little html file.