http-swagger before 1.2.6 allows XSS via PUT requests, because a file that has been uploaded (via httpSwagger.WrapHandler and *webdav.memFile) can subsequently be accessed via a GET request. NOTE: this is independently fixable with respect to CVE-2022-24863, because (if a solution continued to allow PUT requests) large files could have been blocked without blocking JavaScript, or JavaScript could have been blocked without blocking large files.
References
| Link | Resource |
|---|---|
| https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html | Exploit Third Party Advisory |
| https://github.com/swaggo/http-swagger/releases/tag/v1.2.6 | Release Notes |
| https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html | Exploit Third Party Advisory |
| https://github.com/swaggo/http-swagger/releases/tag/v1.2.6 | Release Notes |
Configurations
History
No history.
Information
Published : 2024-02-29 01:44
Updated : 2025-06-16 19:15
NVD link : CVE-2024-25712
Mitre link : CVE-2024-25712
CVE.ORG link : CVE-2024-25712
JSON object : View
Products Affected
http-swagger_project
- http-swagger
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
