385
VMScore

CVE-2018-25031

Published: 11/03/2022 Updated: 03/06/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 385
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Swagger UI prior to 4.1.3 could allow a remote malicious user to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

smartbear swagger ui

Exploits

Swagger UI version 413 user interface misrepresentation of information proof of concept exploit ...

Github Repositories

CVE-2018-25031 Description: Swagger UI before 413 could allow a remote attacker to conduct spoofing attacks By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions Screenshot before attack: PoC: /indexhtml?configUrl=rawgithubusercontentcom/afine-com/CVE-2018-25031/main/pocjson /in

POC de Cross-Site Scripting no Swagger UI: CVE-2018-25031 utilizando Selenium em Python Este repositório contém um script em Python que demonstra uma prova de conceito (POC) de uma vulnerabilidade de Cross-Site Scripting (XSS) no Swagger UI, usando a biblioteca Selenium O objetivo dessa POC é identificar sites que são suscetíveis a essa vulne

.json and .yaml files used to exploit CVE-2018-25031

CVE-2018-25031 Description: Swagger UI before 413 could allow a remote attacker to conduct spoofing attacks By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions Screenshot before attack: PoC: /indexhtml?configUrl=rawgithubusercontentcom/afine-com/CVE-2018-25031/main/pocjson /in

CVE-2018-25031 tests

CVE-2018-25031 CVE-2018-25031 exploits tests Swagger UI before 413 could allow a remote attacker to conduct spoofing attacks By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions HowTo Find the documentation endpoint and add the parameter "configUrl" pointing to testjson or "url"

Exploit Swagger UI - User Interface (UI) Misrepresentation of Critical Information (CVE-2018-25031)

Exploit Swagger UI - CVE-2018-25031 Exploit Swagger UI - User Interface (UI) Misrepresentation of Critical Information (CVE-2018-25031) This exploit checks whether the Swagger UI used is susceptible to exploitation of the User Interface (UI) Misrepresentation of Critical Information vulnerability Requirements Python 3 Selenium Chrome Webdriver First use Install Selenium pip

PoC of CVE-2018-25031

CVE-2018-25031-PoC PoC of CVE-2018-25031

CVE-2018-25031 CVE-2018-25031 exploits tests Swagger UI before 413 could allow a remote attacker to conduct spoofing attacks By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions HowTo Find the documentation endpoint and add the parameter "configUrl" pointing to testjson or "url"