OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No known workarounds are available.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g3hr-p86p-593h | OpenAPI Generator Online - Arbitrary File Read/Delete |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T03:07:46.738Z
Reserved: 2024-05-14T15:39:41.783Z
Link: CVE-2024-35219
Updated: 2024-05-28T16:30:43.588Z
Status : Awaiting Analysis
Published: 2024-05-27T16:15:09.027
Modified: 2024-11-21T09:19:57.753
Link: CVE-2024-35219
OpenCVE Enrichment
No data.
Github GHSA