swagger-ui is vulnerable to CSS injection. The ?url=
parameter allows an attacker to override a hard-coded schema file, which would enable for the Relative Path Overwrite (RPO) exploit technique, allowing exfiltration of confidential information from a victim’s browser such as the CSRF token value.
github.com/springfox/springfox/issues/3336#issuecomment-648512811
github.com/springfox/springfox/issues/3336#issuecomment-652296889
github.com/swagger-api/swagger-ui/pull/5616
github.com/swagger-api/swagger-ui/releases/tag/v3.23.11
github.com/tarantula-team/CSS-injection-in-Swagger-UI
lists.apache.org/thread.html/r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91@%3Ccommits.airflow.apache.org%3E
lists.apache.org/thread.html/r3acb7e494cf1aab99b6784b7c5bbddfd0d4f8a484ab534c3a61ef9cf@%3Ccommits.airflow.apache.org%3E
lists.apache.org/thread.html/r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96@%3Ccommits.airflow.apache.org%3E
lists.apache.org/thread.html/r853ffeb915a400f899de78124d4e0d77a19379d2e11bf8f4e98c624f@%3Ccommits.airflow.apache.org%3E
lists.apache.org/thread.html/ref70b940c4f69560d29d6ba792d6c82865e74de3dcad4c92d99b1f8f@%3Ccommits.airflow.apache.org%3E
www.oracle.com/security-alerts/cpuApr2021.html
www.oracle.com/security-alerts/cpujan2022.html
www.oracle.com/security-alerts/cpujul2022.html
www.oracle.com/security-alerts/cpuoct2020.html