Swagger UI

Exploit Swagger

ko-fiarrow-up-right

Nuclei template

Find Exposed Swagger

Wordlist

OSINT

Audit endpoints

REST APIchevron-right

Burp Extension

Parse OpenAPI documentation using the OpenAPI Parser BApp

Get versions and their vulnerabilities.

Find old versions of Swagger-ui vulnerable to various XSS attacks - XSSwagger

CVE-2018-25031

Swagger UI 4.1.2 and earlier could allow a remote attacker to conduct spoofing attacks.

Test: /api/docs/?configUrl=https://jumpy-floor.surge.sh/test.json

Repo

Found Swagger try each of the file of the repo

Server with CORS Header

POC: test.json

POC: test.yaml

Could lead to CSS exfiltration

Postman / Scanner

or check source code:

or dev tool

If the swagger is a json file use yq to convert it: pip install yq or apt install yq

You can now import the yaml file inside Postman or use it in scanner like Zap

Postman Usagechevron-rightZAP Scanner & other scanning methodschevron-right

SOAPi

Other Scanners

Tools & Scannerschevron-right

Interesting Books

Interesting Bookschevron-right
circle-info

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

ko-fiarrow-up-right

buymeacoffeearrow-up-right

Last updated