Description
OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No known workarounds are available.
Published: 2024-05-27
Score: 8.3 High
EPSS: 53.2% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g3hr-p86p-593h OpenAPI Generator Online - Arbitrary File Read/Delete
History

No history.

Subscriptions

Openapitools Openapi-generator
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T03:07:46.738Z

Reserved: 2024-05-14T15:39:41.783Z

Link: CVE-2024-35219

cve-icon Vulnrichment

Updated: 2024-05-28T16:30:43.588Z

cve-icon NVD

Status : Deferred

Published: 2024-05-27T16:15:09.027

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-35219

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-05-27T00:00:00Z

Links: CVE-2024-35219 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses