OpenAPI Generator Online - Arbitrary File Read/Delete
High severity
GitHub Reviewed
Published
May 27, 2024
in
OpenAPITools/openapi-generator
•
Updated May 28, 2024
Package
Affected versions
< 7.6.0
Patched versions
7.6.0
Description
Published by the National Vulnerability Database
May 27, 2024
Published to the GitHub Advisory Database
May 28, 2024
Reviewed
May 28, 2024
Last updated
May 28, 2024
Impact
Attackers can exploit the vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the
outputFolder
option.Patches
The issue was fixed via OpenAPITools/openapi-generator#18652 (included in v7.6.0 release) by removing the usage of the
outputFolder
option.Workarounds
No workaround available.
References
No other reference available.
References