Описание
Path Traversal in openapi-python-client
Impact
Path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.
Giving this a CVSS score of 3.0 (Low) with CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N/E:P/RL:U/RC:C
Patches
A fix is being worked on for version 0.5.3
Workarounds
Inspect OpenAPI documents before generating clients for them.
For more information
If you have any questions or comments about this advisory:
- Open an issue in openapi-python-client
- Email us at danthony@triaxtec.com
Ссылки
- https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-7wgr-7666-7pwj
- https://nvd.nist.gov/vuln/detail/CVE-2020-15141
- https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746
- https://github.com/pypa/advisory-database/tree/main/vulns/openapi-python-client/PYSEC-2020-70.yaml
- https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13
- https://pypi.org/project/openapi-python-client
Пакеты
openapi-python-client
< 0.5.3
0.5.3
Связанные уязвимости
In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.