Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1xZndxLTZqaDYtOHh4NM4ABAon

OpenRefine has a path traversal in LoadLanguageCommand

The load-language command expects a lang parameter from which it constructs the path of the localization file to load, of the form translations-$LANG.json.
When doing so, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system.

The command should be patched by checking that the normalized path is in the expected directory.

Permalink: https://github.com/advisories/GHSA-qfwq-6jh6-8xx4
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xZndxLTZqaDYtOHh4NM4ABAon
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 13 days ago
Updated: about 12 hours ago


CVSS Score: 7.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

Identifiers: GHSA-qfwq-6jh6-8xx4, CVE-2024-49760
References: Repository: https://github.com/OpenRefine/OpenRefine
Blast Radius: 2.1

Affected Packages

maven:org.openrefine:openrefine
Dependent packages: 0
Dependent repositories: 2
Downloads:
Affected Version Ranges: < 3.8.3
Fixed in: 3.8.3
All affected versions: 3.6.0, 3.6.1, 3.6.2, 3.7.0, 3.7.2, 3.8.0, 3.8.1, 3.8.2
All unaffected versions: 3.8.3, 3.8.4, 3.8.5