Privilege Escalation Affecting io.swagger:swagger-generator Open this link in a new tab package, versions [,2.4.19)

  • Attack Complexity


  • User Interaction


  • Scope


Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id


  • published

    11 Mar 2021

  • disclosed

    11 Mar 2021

  • credit

    Jonathan Leitschuh

How to fix?

Upgrade io.swagger:swagger-generator to version 2.4.19 or higher.


Affected versions of this package are vulnerable to Privilege Escalation. The system temporary directory on unix-like systems is shared between multiple users. Information written to this directory, or directories created under this directory that do not correctly set the posix standard permissions can have these directories read/modified by other users. This is due to a race condition between the call to delete and the call to mkdirs. As such, after deletion of the directory and before the creation of a new one, an attacker could create the directory, giving them ownership of the directory and its contents.