Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21363— Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory

CVSS 5.3 · Medium EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-21363

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory
Source: NVD (National Vulnerability Database)
Vulnerability Description
swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. For more details refer to the referenced GitHub Security Advisory. This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21364.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在具有不安全权限的目录中创建临时文件
Source: NVD (National Vulnerability Database)
Vulnerability Title
HugoMario swagger-codegen 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
HugoMario swagger-codegen是 (HugoMario) 的一个应用软件。用于在给定OpenAPI Spec的情况下自动生成API客户端库(生成SDK),服务器存根和文档。 swagger-codegen 存在安全漏洞,攻击者可利用该漏洞将outputFolder的内容附加到其后。写入该目录的代码在执行时受到攻击者的控制。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
swagger-apiswagger-codegen < 2.4.19 -

II. Public POCs for CVE-2021-21363

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/andikahilmy/CVE-2021-21363-swagger-codegen-vulnerablePOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-21363

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2021-21363

No comments yet


Leave a comment