First published: Thu Jan 26 2023(Updated: )
Modelina is a library for generating data models based on inputs such as AsyncAPI, OpenAPI, or JSON Schema documents. Versions prior to 1.0.0 are vulnerable to Code injection. This issue affects anyone who is using the default presets and/or does not handle the functionality themself. This issue has been partially mitigated in version 1.0.0, with the maintainer's GitHub Security Advisory (GHSA) noting "It is impossible to fully guard against this, because users have access to the original raw information. However, as of version 1, if you only access the constrained models, you will not encounter this issue. Further similar situations are NOT seen as a security issue, but intended behavior." The suggested workaround from the maintainers is "Fully custom presets that change the entire rendering process which can then escape the user input."
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Lfprojects Modelina | <1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23619 is a code injection vulnerability in Modelina.
Modelina is a library for generating data models based on inputs such as AsyncAPI, OpenAPI, or JSON Schema documents.
CVE-2023-23619 affects Modelina by allowing code injection, potentially leading to unauthorized access or control of the system.
Anyone using Modelina versions prior to 1.0.0 and relying on the default presets or not handling the functionality themselves.
CVE-2023-23619 has a severity rating of critical with a score of 8.8 out of 10.
To fix CVE-2023-23619, upgrade to Modelina version 1.0.0 or newer.
You can find additional information about CVE-2023-23619 in the official GitHub advisory: [GitHub Advisory](https://github.com/asyncapi/modelina/security/advisories/GHSA-4jg2-84c2-pj95).
The Common Weakness Enumeration (CWE) for CVE-2023-23619 is CWE-94: Code Injection.