Path traversal in openapi-python-client - CVE-2020-15141
Published: August 28, 2020
Vulnerability identifier: #VU46120
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2020-15141
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
openapi-python-client
openapi-python-client
Software vendor:
Triax Technologies
Triax Technologies
Description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote authenticated attacker can place generated files in arbitrary locations on disk.
Remediation
Install update from vendor's website.
External links
- https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13
- https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746
- https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-7wgr-7666-7pwj
- https://pypi.org/project/openapi-python-client