CVE-2023-41887 – org.openrefine:database
Package
Manager: maven
Name: org.openrefine:database
Vulnerable Version: >=0 <3.7.5
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.52931 pctl0.97878
Details
OpenRefine Remote Code execution in project import with mysql jdbc url attack ### Summary An remote Code exec vulnerability allows any unauthenticated user to exec code on the server. ### Details Hi,Team, i find openrefine support to import data from database,When use mysql jdbc to connect to database,It is vulnerable to jdbc url attacks,for example,unauthenticated attacker can get rce on the server through the mysql userializable If the mysql-connector-java version used on the server side is less than 8.20. In order for the server to enable deserialization we need to set the `autoDeserialize` and `queryInterceptors` parameters in the connection string,As same with https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m, since the concatenation string is a direct concatenation, it is possible to inject the required parameters after the other parameters.  And there is a commons-beanutils dependency library on the server side, which contains an RCE-capable deserialization exploit chain ### PoC env: centos 7 openrefine 3.7.4 jdk11 mysql-connector-java version 8.14.0 you can use the tool https://github.com/4ra1n/mysql-fake-server to running a malicious mysql server. for example use the CB 1.9 Gadget to exec command `touch /tmp/hacked`.  set the `user` to `base64ZGVzZXJfQ0JfdG91Y2ggL3RtcC9oYWNrZWQ=`(`touch /tmp/hacked` base64 encode),`dataBaseName` to `test?autoDeserialize=true&queryInterceptors=com.mysql.cj.jdbc.interceptors.ServerStatusDiffInterceptor#`.   command `touch /tmp/hacked` is executed.  ### Impact An remote Code exec vulnerability allows any unauthenticated user to exec code on the server.
Metadata
Created: 2023-09-12T13:52:54Z
Modified: 2023-09-20T19:15:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-p3r5-x3hr-gpg5/GHSA-p3r5-x3hr-gpg5.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-p3r5-x3hr-gpg5
Finding: F297
Auto approve: 1