CVE-2017-1000208

Source
https://nvd.nist.gov/vuln/detail/CVE-2017-1000208
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-1000208.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-1000208
Aliases
Published
2017-11-17T02:29:01Z
Modified
2025-07-01T23:27:07.417825Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.

References

Affected packages

Git / github.com/swagger-api/swagger-parser

Affected ranges

Type
GIT
Repo
https://github.com/swagger-api/swagger-parser
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.0.1
v1.0.10
v1.0.11
v1.0.12
v1.0.13
v1.0.14
v1.0.15
v1.0.16
v1.0.17
v1.0.18
v1.0.19
v1.0.2
v1.0.20
v1.0.21
v1.0.22
v1.0.23
v1.0.24
v1.0.25
v1.0.26
v1.0.27
v1.0.29
v1.0.3
v1.0.5
v1.0.6
v1.0.8
v1.0.9