logo

CVE-2024-35219 org.openapitools:openapi-generator-online

Package

Manager: maven
Name: org.openapitools:openapi-generator-online
Vulnerable Version: >=0 <7.6.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.21844 pctl0.95547

Details

OpenAPI Generator Online - Arbitrary File Read/Delete ### Impact Attackers can exploit the vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. ### Patches The issue was fixed via https://github.com/OpenAPITools/openapi-generator/pull/18652 (included in v7.6.0 release) by removing the usage of the `outputFolder` option. ### Workarounds No workaround available. ### References No other reference available.

Metadata

Created: 2024-05-28T15:47:57Z
Modified: 2024-05-28T15:47:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-g3hr-p86p-593h/GHSA-g3hr-p86p-593h.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-g3hr-p86p-593h
Finding: F063
Auto approve: 1