Skip to content

Cross-Site Scripting in swagger-ui

High severity GitHub Reviewed Published Sep 1, 2020 to the GitHub Advisory Database • Updated Oct 10, 2023

Package

npm swagger-ui (npm)

Affected versions

< 2.2.1

Patched versions

2.2.1

Description

Affected versions of swagger-ui are vulnerable to cross-site scripting. This vulnerability exists because swagger-ui automatically executes external Javascript that is loaded in via the url query string parameter when a Content-Type: application/javascript header is included.

An attacker can create a server that replies with a malicious script and the proper content-type, and then craft a swagger-ui URL that includes the location to their server/script in the url query string parameter. When viewed, such a link would execute the attacker's malicious script.

Recommendation

Update to 2.2.1 or later.

References

Reviewed Aug 31, 2020
Published to the GitHub Advisory Database Sep 1, 2020
Last updated Oct 10, 2023

Severity

High

Weaknesses

CVE ID

CVE-2016-1000233

GHSA ID

GHSA-mrx7-8hxf-f853

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.