- 
                Notifications
    
You must be signed in to change notification settings  - Fork 784
 
Open
Description
🚨 Vulnerability Report for R.swift Team
Although this mostly do not apply to R.swift being used on a Mac it is important to know about it and still upgrade swift-argument-parser if possible.
Affected Dependency
- Package: swift-argument-parser
 - Version: 1.2.3
 - Repository: https://github.com/apple/swift-argument-parser
 - Package URL: pkg:swift/[email protected]
 
Dependency Chain
R.swift v7.8.0
└── Swift Argument Parser v1.2.3 
Security Vulnerabilities Found
- CVE-2018-4220 (CVSS: 8.8 - HIGH)
 
- Severity: HIGH
 - Attack Vector: Network
 - User Interaction: Required
 - Impact: High confidentiality, integrity, and availability impact
 - Description: Allows attackers to execute arbitrary code in a privileged context because write and execute permissions are enabled during library loading (Swift for Ubuntu)
 - Affected: Swift for Ubuntu before 4.1.1 Security Update 2018-001
 
- CVE-2022-3918 (CVSS: 8.8 - HIGH)
 
- Severity: HIGH
 - Attack Vector: Network
 - Privileges Required: Low
 - Description: CRLF injection vulnerability in URLRequest headers allowing HTTP request smuggling/header injection
 - Affected: Swift Foundation before 5.7.3
 
- CVE-2020-9861 (CVSS: 7.5 - HIGH)
 
- Severity: HIGH
 - Attack Vector: Network
 - Description: Stack overflow in Swift for Linux from deeply nested malicious JSON input
 - Affected: Swift for Ubuntu up to 5.1.4
 
- CVE-2022-1642 (CVSS: 7.5 - HIGH)
 
- Severity: HIGH
 - Attack Vector: Network
 - Description: Denial of service attack via JSON type mismatch in JSONDecoder
 - Affected: Swift for Linux/Windows before 5.6.2
 
- CVE-2019-8790 (CVSS: 5.5 - MEDIUM)
 
- Severity: MEDIUM
 - Attack Vector: Local
 - Description: File descriptor management issue in URLSession leading to data disclosure
 - Affected: Swift for Ubuntu before 5.1.1
 
Risk Assessment for R.swift Usage
- Context: Build-time dependency (not runtime)
 - Primary Risk: These vulnerabilities may not directly affect R.swift's code generation functionality
 - Secondary Risk: Could affect build environment security or CI/CD pipeline
 
Recommendations
- Update Swift Argument Parser to latest version
 - Assess applicability - Many CVEs target Linux/Ubuntu Swift, may not affect macOS builds
 - Consider suppression if vulnerabilities don't apply to R.swift's usage pattern
 
Scan Details
- Scan Date: 2025-08-27
 - OWASP Dependency-Check: v12.1.3
 - Detection Confidence: HIGHEST
 - NVD API: Used for real-time vulnerability data
 
Note: This report was generated automatically by OWASP Dependency-Check during a security audit
Metadata
Metadata
Assignees
Labels
No labels