CVE-2024-35219 – org.openapitools:openapi-generator-online
Package
Manager: maven
Name: org.openapitools:openapi-generator-online
Vulnerable Version: >=0 <7.6.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.21844 pctl0.95547
Details
OpenAPI Generator Online - Arbitrary File Read/Delete ### Impact Attackers can exploit the vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. ### Patches The issue was fixed via https://github.com/OpenAPITools/openapi-generator/pull/18652 (included in v7.6.0 release) by removing the usage of the `outputFolder` option. ### Workarounds No workaround available. ### References No other reference available.
Metadata
Created: 2024-05-28T15:47:57Z
Modified: 2024-05-28T15:47:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-g3hr-p86p-593h/GHSA-g3hr-p86p-593h.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-g3hr-p86p-593h
Finding: F063
Auto approve: 1