node-red-azure-webapp icon indicating copy to clipboard operation
node-red-azure-webapp copied to clipboard

CVE-2019-17495 (High) detected in swagger-ui-2.1.4.tgz

Open mend-bolt-for-github[bot] opened this issue 5 years ago • 0 comments

CVE-2019-17495 - High Severity Vulnerability

Vulnerable Library - swagger-ui-2.1.4.tgz

Swagger UI is a dependency-free collection of HTML, JavaScript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API

Library home page: https://registry.npmjs.org/swagger-ui/-/swagger-ui-2.1.4.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/node-red-node-swagger/node_modules/swagger-ui/package.json

Dependency Hierarchy:

  • node-red-node-swagger-0.1.9.tgz (Root Library)
    • :x: swagger-ui-2.1.4.tgz (Vulnerable Library)

Found in HEAD commit: a828769834f37b291096091f7d78329324424ce2

Vulnerability Details

A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that

Publish Date: 2019-10-10

URL: CVE-2019-17495

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17495

Release Date: 2019-10-10

Fix Resolution: 3.23.11


Step up your Open Source Security Game with WhiteSource here