Description
OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No known workarounds are available.
Published: 2024-05-27
Score: 8.3 High
EPSS: 53.2% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g3hr-p86p-593h OpenAPI Generator Online - Arbitrary File Read/Delete
History

No history.

Subscriptions

Openapitools Openapi-generator
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T03:07:46.738Z

Reserved: 2024-05-14T15:39:41.783Z

Link: CVE-2024-35219

cve-icon Vulnrichment

Updated: 2024-05-28T16:30:43.588Z

cve-icon NVD

Status : Deferred

Published: 2024-05-27T16:15:09.027

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-35219

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-05-27T00:00:00Z

Links: CVE-2024-35219 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses