Swagger UI

Exploit Swagger

ko-fi

Nuclei template

Find Exposed Swagger

Wordlist

OSINT

Audit endpoints

REST API

Burp Extension

Parse OpenAPI documentation using the OpenAPI Parser BApp

Get versions and their vulnerabilities.

Find old versions of Swagger-ui vulnerable to various XSS attacks - XSSwagger

CVE-2018-25031

Swagger UI 4.1.2 and earlier could allow a remote attacker to conduct spoofing attacks.

Test: /api/docs/?configUrl=https://jumpy-floor.surge.sh/test.json

Repo

Found Swagger try each of the file of the repo

Server with CORS Header

POC: test.json

POC: test.yaml

Could lead to CSS exfiltration

Postman / Scanner

or check source code:

or dev tool

If the swagger is a json file use yq to convert it: pip install yq or apt install yq

You can now import the yaml file inside Postman or use it in scanner like Zap

Postman UsageZAP Scanner & other scanning methods

SOAPi

Other Scanners

Tools & Scanners

Interesting Books

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

ko-fi

buymeacoffee

Last updated