In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.
References
Link | Resource |
---|---|
https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13 | Release Notes Third Party Advisory |
https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746 | Patch Third Party Advisory |
https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-7wgr-7666-7pwj | Third Party Advisory |
https://pypi.org/project/openapi-python-client | Product Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-08-14 17:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-15141
Mitre link : CVE-2020-15141
CVE.ORG link : CVE-2020-15141
JSON object : View
Products Affected
openapi-python-client_project
- openapi-python-client
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')