OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No known workarounds are available.
References
Configurations
No configuration.
History
21 Nov 2024, 09:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/OpenAPITools/openapi-generator/commit/edbb021aadae47dcfe690313ce5119faf77f800d - | |
References | () https://github.com/OpenAPITools/openapi-generator/pull/18652 - | |
References | () https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-g3hr-p86p-593h - |
28 May 2024, 12:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 May 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-27 16:15
Updated : 2024-11-21 09:19
NVD link : CVE-2024-35219
Mitre link : CVE-2024-35219
CVE.ORG link : CVE-2024-35219
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')