zc_plugin_dm
zc_plugin_dm copied to clipboard
CVE-2018-25031 (Medium) detected in drf_yasg-1.20.0-py2.py3-none-any.whl
CVE-2018-25031 - Medium Severity Vulnerability
Vulnerable Library - drf_yasg-1.20.0-py2.py3-none-any.whl
Automated generation of real Swagger/OpenAPI 2.0 schemas from Django Rest Framework code.
Library home page: https://files.pythonhosted.org/packages/fc/5c/4584321c7a7fd85429f73fd4c3406b09309e3a071e250177739384a4ab48/drf_yasg-1.20.0-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /tmp/ws-ua_20250619225906_JOHPWI/python_PXNJNQ/202506192259101/env/lib/python3.9/site-packages/drf_yasg-1.20.0.dist-info
Dependency Hierarchy:
- :x: drf_yasg-1.20.0-py2.py3-none-any.whl (Vulnerable Library)
Found in HEAD commit: 41f949b863ead7c74b72a01845dbe0d88c24a364
Found in base branch: main
Vulnerability Details
Swagger UI 4.1.2 and earlier could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. Note: This was originally claimed to be resolved in 4.1.3. However, third parties have indicated this is not resolved in 4.1.3 and even occurs in that version and possibly others. Converted from WS-2021-0461, on 2022-12-21.
Publish Date: 2022-03-11
URL: CVE-2018-25031
CVSS 3 Score Details (4.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-qrmm-w75w-3wpx
Release Date: 2022-03-11
Fix Resolution: swagger-ui - 4.1.3;swagger-ui-dist - 4.1.3
Step up your Open Source Security Game with Mend here