Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xZndxLTZqaDYtOHh4NM4ABAon
OpenRefine has a path traversal in LoadLanguageCommand
The load-language command expects a lang
parameter from which it constructs the path of the localization file to load, of the form translations-$LANG.json
.
When doing so, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system.
The command should be patched by checking that the normalized path is in the expected directory.
Permalink: https://github.com/advisories/GHSA-qfwq-6jh6-8xx4JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xZndxLTZqaDYtOHh4NM4ABAon
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 13 days ago
Updated: about 12 hours ago
CVSS Score: 7.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Identifiers: GHSA-qfwq-6jh6-8xx4, CVE-2024-49760
References:
- https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qfwq-6jh6-8xx4
- https://github.com/OpenRefine/OpenRefine/commit/24d084052dc55426fe460f2a17524fd18d28b20c
- https://nvd.nist.gov/vuln/detail/CVE-2024-49760
- https://github.com/advisories/GHSA-qfwq-6jh6-8xx4
Blast Radius: 2.1
Affected Packages
maven:org.openrefine:openrefine
Dependent packages: 0Dependent repositories: 2
Downloads:
Affected Version Ranges: < 3.8.3
Fixed in: 3.8.3
All affected versions: 3.6.0, 3.6.1, 3.6.2, 3.7.0, 3.7.2, 3.8.0, 3.8.1, 3.8.2
All unaffected versions: 3.8.3, 3.8.4, 3.8.5