
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-27162 affects openapi-generator versions up to v6.4.0. The vulnerability is a Server-Side Request Forgery (SSRF) discovered in the component /api/gen/clients/{language}. The issue was disclosed on March 31, 2023 and received a CVSS v3.1 base score of 9.1 (Critical) (NVD, CISA).
The vulnerability exists in the API endpoints /api/gen/clients/{language} and /api/gen/servers/{framework}, which are vulnerable to unauthenticated SSRF attacks via the openAPIUrl parameter. When exploited, an attacker can send crafted API requests to access internal network resources and sensitive information (SJTU Notes, GitHub Advisory).
The vulnerability can lead to information disclosure and data exfiltration, allowing attackers to access any resource obtainable via HTTP requests on the local network. This includes unauthorized access to internal network HTTP servers, internal RESTful APIs, databases, and the ability to perform port scanning and IP enumeration of the internal network (SJTU Notes).
Users should upgrade to openapi-generator versions above 6.4.0 to address this vulnerability. If immediate upgrade is not possible, it is recommended to review and validate all inputs, especially those from untrusted sources, before using OpenAPI Generator to generate API clients, server stubs, or documentation (OpenAPI Generator).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."