{"id":"GO-2022-0427","summary":"Unprotected file upload in github.com/swaggo/http-swagger","details":"The httpSwagger package's HTTP handler provides WebDAV read/write access to an in-memory filesystem. An attacker can exploit this to cause memory exhaustion by uploading many files, XSS attacks by uploading malicious files, or other unexpected behaviors.","aliases":["CVE-2022-24863","CVE-2024-25712","GHSA-49w7-5r33-jm9m","GHSA-xg75-q3q5-cqmv"],"modified":"2026-03-17T04:19:05.145939Z","published":"2024-02-29T15:38:09Z","database_specific":{"review_status":"REVIEWED","url":"https://pkg.go.dev/vuln/GO-2022-0427"},"references":[{"type":"WEB","url":"https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html"},{"type":"FIX","url":"https://github.com/swaggo/http-swagger/pull/62"},{"type":"REPORT","url":"https://github.com/swaggo/http-swagger/issues/61"}],"affected":[{"package":{"name":"github.com/swaggo/http-swagger","ecosystem":"Go","purl":"pkg:golang/github.com/swaggo/http-swagger"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.2.6"}]}],"ecosystem_specific":{"imports":[{"path":"github.com/swaggo/http-swagger"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2022-0427.json"}}],"schema_version":"1.7.5"}