Swagger UI 4.1.2 and earlier could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. Note: This was originally claimed to be resolved in 4.1.3. However, third parties have indicated this is not resolved in 4.1.3 and even occurs in that version and possibly others.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://security.snyk.io/vuln/SNYK-JS-SWAGGERUI-2314885 | third party advisory patch |
https://github.com/swagger-api/swagger-ui/issues/4872 | issue tracking third party advisory patch |
https://github.com/swagger-api/swagger-ui/releases/tag/v4.1.3 | third party advisory release notes |
https://security.netapp.com/advisory/ntap-20220407-0004/ | third party advisory |