Description
OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No known workarounds are available.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g3hr-p86p-593h | OpenAPI Generator Online - Arbitrary File Read/Delete |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T03:07:46.738Z
Reserved: 2024-05-14T15:39:41.783Z
Link: CVE-2024-35219
Updated: 2024-05-28T16:30:43.588Z
Status : Deferred
Published: 2024-05-27T16:15:09.027
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-35219
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA