Description
A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
Remediation
References
https://github.com/swagger-api/swagger-parser/pull/481
https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208
Related Vulnerabilities
CVE-2017-11605 Vulnerability in maven package org.webjars.npm:node-sass
CVE-2021-34371 Vulnerability in maven package org.neo4j:neo4j
CVE-2023-29471 Vulnerability in maven package com.typesafe.akka:akka-stream-kafka_2.13
CVE-2020-7751 Vulnerability in maven package org.webjars.npm:pathval
CVE-2021-27515 Vulnerability in maven package org.webjars.bowergithub.unshiftio:url-parse