Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS00OXc3LTVyMzMtam05bc4AA5ok

http-swagger XSS via PUT requests

http-swagger before 1.2.6 allows XSS via PUT requests, because a file that has been uploaded (via httpSwagger.WrapHandler and *webdav.memFile) can subsequently be accessed via a GET request. NOTE: this is independently fixable with respect to CVE-2022-24863, because (if a solution continued to allow PUT requests) large files could have been blocked without blocking JavaScript, or JavaScript could have been blocked without blocking large files.

Permalink: https://github.com/advisories/GHSA-49w7-5r33-jm9m
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00OXc3LTVyMzMtam05bc4AA5ok
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 months ago
Updated: about 2 months ago


Identifiers: GHSA-49w7-5r33-jm9m, CVE-2024-25712
References: Repository: https://github.com/swaggo/http-swagger
Blast Radius: 0.0

Affected Packages

go:github.com/swaggo/http-swagger
Dependent packages: 481
Dependent repositories: 932
Downloads:
Affected Version Ranges: < 1.2.6
Fixed in: 1.2.6
All affected versions: 1.0.0, 1.1.1, 1.1.2, 1.2.0, 1.2.1, 1.2.5
All unaffected versions: 1.2.6, 1.2.7, 1.2.8, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4