OpenRefine is a free, open source tool for working with messy data. The load-language command expects a `lang` parameter from which it constructs the path of the localization file to load, of the form `translations-$LANG.json`. But when doing so in versions prior to 3.8.3, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system. Version 3.8.3 addresses this issue.
History

Wed, 06 Nov 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Openrefine
Openrefine openrefine
CPEs cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*
Vendors & Products Openrefine
Openrefine openrefine

Fri, 25 Oct 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 24 Oct 2024 21:45:00 +0000

Type Values Removed Values Added
Description OpenRefine is a free, open source tool for working with messy data. The load-language command expects a `lang` parameter from which it constructs the path of the localization file to load, of the form `translations-$LANG.json`. But when doing so in versions prior to 3.8.3, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system. Version 3.8.3 addresses this issue.
Title OpenRefine has a path traversal in LoadLanguageCommand
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-10-24T21:35:28.932Z

Updated: 2024-10-25T17:22:03.158Z

Reserved: 2024-10-18T13:43:23.455Z

Link: CVE-2024-49760

cve-icon Vulnrichment

Updated: 2024-10-25T17:21:59.208Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-24T22:15:04.703

Modified: 2024-11-06T15:01:01.013

Link: CVE-2024-49760

cve-icon Redhat

No data.