Description
A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
Remediation
References
https://github.com/swagger-api/swagger-parser/releases/tag/v1.0.31
https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208
Related Vulnerabilities
CVE-2020-2213 Vulnerability in maven package org.jenkins-ci.plugins:whitesource
CVE-2020-23814 Vulnerability in maven package com.xuxueli:xxl-job
CVE-2022-23496 Vulnerability in maven package nl.basjes.parse.useragent:yauaa-nifi-parent
CVE-2020-12648 Vulnerability in maven package org.webjars.bower:tinymce
CVE-2017-1000487 Vulnerability in maven package org.codehaus.plexus:plexus-utils