org.openapitools:openapi-generator-project@4.2.2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.openapitools:openapi-generator-project package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Server-side Request Forgery (SSRF)

org.openapitools:openapi-generator-project is an is a package that allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec (v2, v3).

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the API endpoints /api/gen/clients/{language} and /api/gen/servers/{framework}. It allows attackers to access network resources and sensitive information via a crafted API request.

How to fix Server-side Request Forgery (SSRF)?

There is no fixed version for org.openapitools:openapi-generator-project.

[0,)
  • M
Information Disclosure

org.openapitools:openapi-generator-project is an is a package that allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec (v2, v3).

Affected versions of this package are vulnerable to Information Disclosure. This vulnerability impacts generated code. If this code is generated as a one-off occasion, not as a part of an automated CI/CD process, it will remain vulnerable until fixed manually.

The use of the JDK method File.createTempFile creates an insecure temporary file that can leave application and system data vulnerable to exposure. Auto-generated code that deals with uploading or downloading binary data through API endpoints will create insecure temporary files during the process.

How to fix Information Disclosure?

Upgrade org.openapitools:openapi-generator-project to version 5.1.0 or higher.

[,5.1.0)