{"id":"CVE-2024-25712","details":"http-swagger before 1.2.6 allows XSS via PUT requests, because a file that has been uploaded (via httpSwagger.WrapHandler and *webdav.memFile) can subsequently be accessed via a GET request. NOTE: this is independently fixable with respect to CVE-2022-24863, because (if a solution continued to allow PUT requests) large files could have been blocked without blocking JavaScript, or JavaScript could have been blocked without blocking large files.","aliases":["CVE-2022-24863","GHSA-49w7-5r33-jm9m","GHSA-xg75-q3q5-cqmv","GO-2022-0427"],"modified":"2026-05-01T04:23:27.214335Z","published":"2024-02-11T00:00:00Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/25xxx/CVE-2024-25712.json","cna_assigner":"mitre"},"references":[{"type":"WEB","url":"https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html"},{"type":"WEB","url":"https://github.com/swaggo/http-swagger/releases/tag/v1.2.6"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/25xxx/CVE-2024-25712.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-25712"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/swaggo/http-swagger","events":[{"introduced":"0"},{"fixed":"b7d83e8fba85a7a51aa7e45e8244b4173f15049e"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.2.6"}]}}],"versions":["v1.0.0","v1.1.1","v1.1.2","v1.2.0","v1.2.1","v1.2.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-25712.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}