Lucene search

K
rubygemsRubySecRUBY:RSWAG-2023-38337
HistoryJul 14, 2023 - 9:00 p.m.

rswag vulnerable to arbitrary JSON and YAML file read via directory traversal

2023-07-1421:00:00
RubySec
github.com
8
rswag
vulnerability
file read
json
yaml
directory traversal
security

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

rswag before 2.10.1 allows remote attackers to read arbitrary JSON and
YAML files via directory traversal, because rswag-api can expose a file that is
not the OpenAPI (or Swagger) specification file of a project.

Affected configurations

Vulners
Node
rubyrswagRange2.10.1
VendorProductVersionCPE
rubyrswag*cpe:2.3:a:ruby:rswag:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Related for RUBY:RSWAG-2023-38337