-
Notifications
You must be signed in to change notification settings - Fork 781
Open
Description
🚨 Vulnerability Report for R.swift Team
Although this mostly do not apply to R.swift being used on a Mac it is important to know about it and still upgrade swift-argument-parser if possible.
Affected Dependency
- Package: swift-argument-parser
- Version: 1.2.3
- Repository: https://github.com/apple/swift-argument-parser
- Package URL: pkg:swift/swift-argument-parser@1.2.3
Dependency Chain
R.swift v7.8.0
└── Swift Argument Parser v1.2.3
Security Vulnerabilities Found
- CVE-2018-4220 (CVSS: 8.8 - HIGH)
- Severity: HIGH
- Attack Vector: Network
- User Interaction: Required
- Impact: High confidentiality, integrity, and availability impact
- Description: Allows attackers to execute arbitrary code in a privileged context because write and execute permissions are enabled during library loading (Swift for Ubuntu)
- Affected: Swift for Ubuntu before 4.1.1 Security Update 2018-001
- CVE-2022-3918 (CVSS: 8.8 - HIGH)
- Severity: HIGH
- Attack Vector: Network
- Privileges Required: Low
- Description: CRLF injection vulnerability in URLRequest headers allowing HTTP request smuggling/header injection
- Affected: Swift Foundation before 5.7.3
- CVE-2020-9861 (CVSS: 7.5 - HIGH)
- Severity: HIGH
- Attack Vector: Network
- Description: Stack overflow in Swift for Linux from deeply nested malicious JSON input
- Affected: Swift for Ubuntu up to 5.1.4
- CVE-2022-1642 (CVSS: 7.5 - HIGH)
- Severity: HIGH
- Attack Vector: Network
- Description: Denial of service attack via JSON type mismatch in JSONDecoder
- Affected: Swift for Linux/Windows before 5.6.2
- CVE-2019-8790 (CVSS: 5.5 - MEDIUM)
- Severity: MEDIUM
- Attack Vector: Local
- Description: File descriptor management issue in URLSession leading to data disclosure
- Affected: Swift for Ubuntu before 5.1.1
Risk Assessment for R.swift Usage
- Context: Build-time dependency (not runtime)
- Primary Risk: These vulnerabilities may not directly affect R.swift's code generation functionality
- Secondary Risk: Could affect build environment security or CI/CD pipeline
Recommendations
- Update Swift Argument Parser to latest version
- Assess applicability - Many CVEs target Linux/Ubuntu Swift, may not affect macOS builds
- Consider suppression if vulnerabilities don't apply to R.swift's usage pattern
Scan Details
- Scan Date: 2025-08-27
- OWASP Dependency-Check: v12.1.3
- Detection Confidence: HIGHEST
- NVD API: Used for real-time vulnerability data
Note: This report was generated automatically by OWASP Dependency-Check during a security audit
Metadata
Metadata
Assignees
Labels
No labels