logo

CVE-2024-49760 org.openrefine:openrefine

Package

Manager: maven
Name: org.openrefine:openrefine
Vulnerable Version: >=0 <3.8.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00051 pctl0.15372

Details

OpenRefine has a path traversal in LoadLanguageCommand The load-language command expects a `lang` parameter from which it constructs the path of the localization file to load, of the form `translations-$LANG.json`. When doing so, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system. The command should be patched by checking that the normalized path is in the expected directory.

Metadata

Created: 2024-10-24T18:32:40Z
Modified: 2024-11-06T15:47:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-qfwq-6jh6-8xx4/GHSA-qfwq-6jh6-8xx4.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-qfwq-6jh6-8xx4
Finding: F063
Auto approve: 1