Vulnerability Description
A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Swagger | Swagger-Codegen | <= 2.2.2 |
| Swagger | Swagger-Parser | <= 1.0.30 |
Related Weaknesses (CWE)
References
- https://github.com/swagger-api/swagger-parser/pull/481Issue Tracking
- https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208Third Party Advisory
- https://github.com/swagger-api/swagger-parser/pull/481Issue Tracking
- https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208Third Party Advisory
FAQ
What is CVE-2017-1000207?
CVE-2017-1000207 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API ...
How severe is CVE-2017-1000207?
CVE-2017-1000207 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-1000207?
Check the references section above for vendor advisories and patch information. Affected products include: Swagger Swagger-Codegen, Swagger Swagger-Parser.