High severity8.8NVD Advisory· Published Nov 27, 2017· Updated May 13, 2026
CVE-2017-1000207
CVE-2017-1000207
Description
A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.swagger:swagger-parserMaven | < 1.0.31 | 1.0.31 |
io.swagger:swagger-codegenMaven | < 2.2.2 | 2.2.2 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-vgvf-9jh3-fg75ghsaADVISORY
- lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208nvdThird Party AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2017-1000207ghsaADVISORY
- github.com/swagger-api/swagger-parser/pull/481nvdIssue TrackingWEB
News mentions
0No linked articles in our index yet.