OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No known workarounds are available.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  Github GHSA | 
                GHSA-g3hr-p86p-593h | OpenAPI Generator Online - Arbitrary File Read/Delete | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T03:07:46.738Z
Reserved: 2024-05-14T15:39:41.783Z
Link: CVE-2024-35219
Updated: 2024-05-28T16:30:43.588Z
Status : Awaiting Analysis
Published: 2024-05-27T16:15:09.027
Modified: 2024-11-21T09:19:57.753
Link: CVE-2024-35219
                        OpenCVE Enrichment
                    No data.
 Github GHSA