Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS00OXc3LTVyMzMtam05bc4AA5ok
http-swagger XSS via PUT requests
http-swagger before 1.2.6 allows XSS via PUT requests, because a file that has been uploaded (via httpSwagger.WrapHandler and *webdav.memFile) can subsequently be accessed via a GET request. NOTE: this is independently fixable with respect to CVE-2022-24863, because (if a solution continued to allow PUT requests) large files could have been blocked without blocking JavaScript, or JavaScript could have been blocked without blocking large files.
Permalink: https://github.com/advisories/GHSA-49w7-5r33-jm9mJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00OXc3LTVyMzMtam05bc4AA5ok
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 9 months ago
Updated: 9 months ago
Identifiers: GHSA-49w7-5r33-jm9m, CVE-2024-25712
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-25712
- https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html
- https://github.com/swaggo/http-swagger/releases/tag/v1.2.6
- https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e
- https://github.com/swaggo/http-swagger/pull/62
- https://github.com/advisories/GHSA-49w7-5r33-jm9m
Blast Radius: 0.0
Affected Packages
go:github.com/swaggo/http-swagger
Dependent packages: 481Dependent repositories: 932
Downloads:
Affected Version Ranges: < 1.2.6
Fixed in: 1.2.6
All affected versions: 1.0.0, 1.1.1, 1.1.2, 1.2.0, 1.2.1, 1.2.5
All unaffected versions: 1.2.6, 1.2.7, 1.2.8, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4