CVE-2024-25712

http-swagger before 1.2.6 allows XSS via PUT requests, because a file that has been uploaded (via httpSwagger.WrapHandler and *webdav.memFile) can subsequently be accessed via a GET request. NOTE: this is independently fixable with respect to CVE-2022-24863, because (if a solution continued to allow PUT requests) large files could have been blocked without blocking JavaScript, or JavaScript could have been blocked without blocking large files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:http-swagger_project:http-swagger:*:*:*:*:*:*:*:*

History

16 Jan 2025, 17:51

Type Values Removed Values Added
First Time Http-swagger Project
Http-swagger Project http-swagger
References () https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html - () https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html - Exploit, Third Party Advisory
References () https://github.com/swaggo/http-swagger/releases/tag/v1.2.6 - () https://github.com/swaggo/http-swagger/releases/tag/v1.2.6 - Release Notes
CWE CWE-79
CPE cpe:2.3:a:http-swagger_project:http-swagger:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

21 Nov 2024, 09:01

Type Values Removed Values Added
References () https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html - () https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html -
References () https://github.com/swaggo/http-swagger/releases/tag/v1.2.6 - () https://github.com/swaggo/http-swagger/releases/tag/v1.2.6 -

29 Feb 2024, 01:44

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-29 01:44

Updated : 2025-01-16 17:51


NVD link : CVE-2024-25712

Mitre link : CVE-2024-25712

CVE.ORG link : CVE-2024-25712


JSON object : View

Products Affected

http-swagger_project

  • http-swagger
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')