GHSA-f36p-42jv-8rh2

Source
https://github.com/advisories/GHSA-f36p-42jv-8rh2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-f36p-42jv-8rh2/GHSA-f36p-42jv-8rh2.json
Published
2022-09-30T04:53:37Z
Modified
2023-04-11T01:39:07.930441Z
Details

Impact

A XSS vulnerability in the provided (outdated) Swagger-UI is exploitable in applications using lithium with Swagger-UI enabled. This allows an attacker gain Remote Code Execution (RCE) and potentially exfiltrate secrets in the context of this swagger session.

Patches

The used swagger-ui was updated by switching to the latest version of dropwizard-swagger in 8b9b406d608fe482ec0e7adf8705834bca92d7df

Workarounds

The risk of injected external content can be reduced by setting up a Content-Security-Policy.

References

  • https://www.vidocsecurity.com/blog/hacking-swagger-ui-from-xss-to-account-takeovers/

Credits

We thank Mohit Kumar for reporting this vulnerability!

References

Affected packages

Maven / com.wire:lithium

Package

Name
com.wire:lithium

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
3.4.2

Affected versions

3.*

3.3.0
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.3.7
3.4.0
3.4.1

Maven / com.wire.bots:lithium

Package

Name
com.wire.bots:lithium

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown

Database specific

{
    "last_known_affected_version_range": "< 3.4.2"
}