OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the `/extension/gdata/authorized` endpoint includes the `state` GET parameter verbatim in a `<script>` tag in the output, so without escaping. An attacker could lead or redirect a user to a crafted URL containing JavaScript code, which would then cause that code to be executed in the victim's browser as if it was part of OpenRefine. Version 3.8.3 fixes this issue.
History

Mon, 28 Oct 2024 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Openrefine
Openrefine openrefine
CPEs cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*
Vendors & Products Openrefine
Openrefine openrefine
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 24 Oct 2024 20:30:00 +0000

Type Values Removed Values Added
Description OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the `/extension/gdata/authorized` endpoint includes the `state` GET parameter verbatim in a `<script>` tag in the output, so without escaping. An attacker could lead or redirect a user to a crafted URL containing JavaScript code, which would then cause that code to be executed in the victim's browser as if it was part of OpenRefine. Version 3.8.3 fixes this issue.
Title Reflected cross-site scripting vulnerability (XSS) in GData extension (authorized.vt)
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-10-24T20:11:19.814Z

Updated: 2024-10-28T13:00:42.860Z

Reserved: 2024-10-04T16:00:09.630Z

Link: CVE-2024-47878

cve-icon Vulnrichment

Updated: 2024-10-28T13:00:37.392Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-24T21:15:12.293

Modified: 2024-10-30T18:01:44.277

Link: CVE-2024-47878

cve-icon Redhat

No data.