CVE-2019-17495 (High) detected in swagger-ui-2.1.4.tgz
CVE-2019-17495 - High Severity Vulnerability
Vulnerable Library - swagger-ui-2.1.4.tgz
Swagger UI is a dependency-free collection of HTML, JavaScript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API
Library home page: https://registry.npmjs.org/swagger-ui/-/swagger-ui-2.1.4.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/node-red-node-swagger/node_modules/swagger-ui/package.json
Dependency Hierarchy:
- node-red-node-swagger-0.1.9.tgz (Root Library)
- :x: swagger-ui-2.1.4.tgz (Vulnerable Library)
Found in HEAD commit: a828769834f37b291096091f7d78329324424ce2
Vulnerability Details
A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that
Publish Date: 2019-10-10
URL: CVE-2019-17495
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17495
Release Date: 2019-10-10
Fix Resolution: 3.23.11
Step up your Open Source Security Game with WhiteSource here