Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12Yzc5LTY1cHItcTgyds4AA0uC
rswag vulnerable to arbitrary JSON and YAML file read via directory traversal
rswag before 2.10.1 allows remote attackers to read arbitrary JSON and YAML files via directory traversal, because rswag-api can expose a file that is not the OpenAPI (or Swagger) specification file of a project.
Permalink: https://github.com/advisories/GHSA-vc79-65pr-q82vJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12Yzc5LTY1cHItcTgyds4AA0uC
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 10 months ago
Updated: 6 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-vc79-65pr-q82v, CVE-2023-38337
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-38337
- https://github.com/rswag/rswag/issues/653
- https://github.com/rswag/rswag/compare/2.9.0...2.10.1
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rswag/CVE-2023-38337.yml
- https://github.com/advisories/GHSA-vc79-65pr-q82v
Blast Radius: 20.9
Affected Packages
rubygems:rswag
Dependent packages: 2Dependent repositories: 620
Downloads: 6,940,335 total
Affected Version Ranges: < 2.10.1
Fixed in: 2.10.1
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.1.0, 1.2.0, 1.2.1, 1.3.0, 1.4.0, 1.5.0, 1.5.1, 1.5.2, 1.6.0, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.1.0, 2.1.1, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.3.3, 2.4.0, 2.5.0, 2.5.1, 2.6.0, 2.7.0, 2.8.0, 2.9.0, 2.10.0
All unaffected versions: 2.10.1, 2.11.0, 2.12.0, 2.13.0