http-swagger before 1.2.6 allows XSS via PUT requests, because a file that has been uploaded (via httpSwagger.WrapHandler and *webdav.memFile) can subsequently be accessed via a GET request. NOTE: this is independently fixable with respect to CVE-2022-24863, because (if a solution continued to allow PUT requests) large files could have been blocked without blocking JavaScript, or JavaScript could have been blocked without blocking large files.
References
Link | Resource |
---|---|
https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html | Exploit Third Party Advisory |
https://github.com/swaggo/http-swagger/releases/tag/v1.2.6 | Release Notes |
https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html | Exploit Third Party Advisory |
https://github.com/swaggo/http-swagger/releases/tag/v1.2.6 | Release Notes |
Configurations
History
16 Jan 2025, 17:51
Type | Values Removed | Values Added |
---|---|---|
First Time |
Http-swagger Project
Http-swagger Project http-swagger |
|
References | () https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html - Exploit, Third Party Advisory | |
References | () https://github.com/swaggo/http-swagger/releases/tag/v1.2.6 - Release Notes | |
CWE | CWE-79 | |
CPE | cpe:2.3:a:http-swagger_project:http-swagger:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
21 Nov 2024, 09:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html - | |
References | () https://github.com/swaggo/http-swagger/releases/tag/v1.2.6 - |
29 Feb 2024, 01:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-29 01:44
Updated : 2025-01-16 17:51
NVD link : CVE-2024-25712
Mitre link : CVE-2024-25712
CVE.ORG link : CVE-2024-25712
JSON object : View
Products Affected
http-swagger_project
- http-swagger
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')