Description
In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.
References (4)
Core 4
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13
Third Party Advisory x_refsource_confirm
https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-7wgr-7666-7pwj
Product, Third Party Advisory x_refsource_misc
https://pypi.org/project/openapi-python-client
Patch, Third Party Advisory x_refsource_misc
https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746
Scores
CVSS v3
3.0
EPSS
0.0036
EPSS Percentile
58.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
Details
CWE
CWE-22
Status
published
Products (2)
openapi-python-client_project/openapi-python-client
< 0.5.3
pypi/openapi-python-client
0 - 0.5.3PyPI
Published
Aug 14, 2020
Tracked Since
Feb 18, 2026