CVE-2024-49760 – org.openrefine:openrefine
Package
Manager: maven
Name: org.openrefine:openrefine
Vulnerable Version: >=0 <3.8.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00051 pctl0.15372
Details
OpenRefine has a path traversal in LoadLanguageCommand The load-language command expects a `lang` parameter from which it constructs the path of the localization file to load, of the form `translations-$LANG.json`. When doing so, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system. The command should be patched by checking that the normalized path is in the expected directory.
Metadata
Created: 2024-10-24T18:32:40Z
Modified: 2024-11-06T15:47:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-qfwq-6jh6-8xx4/GHSA-qfwq-6jh6-8xx4.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-qfwq-6jh6-8xx4
Finding: F063
Auto approve: 1