Bug 2283564 (CVE-2024-35219) - CVE-2024-35219 openapi-generator-online: Path traversal via outputFolder option
Summary: CVE-2024-35219 openapi-generator-online: Path traversal via outputFolder option
Keywords:
Status: NEW
Alias: CVE-2024-35219
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2283565
TreeView+ depends on / blocked
 
Reported: 2024-05-27 22:14 UTC by Pedro Sampaio
Modified: 2025-05-06 08:29 UTC (History)
17 users (show)

Fixed In Version: openapi-generator 7.6.0
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2024-05-27 22:14:59 UTC
OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No known workarounds are available.

References:

https://github.com/OpenAPITools/openapi-generator/commit/edbb021aadae47dcfe690313ce5119faf77f800d
https://github.com/OpenAPITools/openapi-generator/pull/18652
https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-g3hr-p86p-593h


Note You need to log in before you can comment on or make changes to this bug.