A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/swagger-api/swagger-parser/pull/481 | Issue Tracking | 
| https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208 | Third Party Advisory | 
| https://github.com/swagger-api/swagger-parser/pull/481 | Issue Tracking | 
| https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208 | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 03:04
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/swagger-api/swagger-parser/pull/481 - Issue Tracking | |
| References | () https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208 - Third Party Advisory | 
Information
                Published : 2017-11-27 15:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-1000207
Mitre link : CVE-2017-1000207
CVE.ORG link : CVE-2017-1000207
JSON object : View
Products Affected
                swagger
- swagger-parser
- swagger-codegen
CWE
                
                    
                        
                        CWE-502
                        
            Deserialization of Untrusted Data
