OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the `export-rows` command can be used in such a way that it reflects part of the request verbatim, with a Content-Type header also taken from the request. An attacker could lead a user to a malicious page that submits a form POST that contains embedded JavaScript code. This code would then be included in the response, along with an attacker-controlled `Content-Type` header, and so potentially executed in the victim's browser as if it was part of OpenRefine. The attacker-provided code can do anything the user can do, including deleting projects, retrieving database passwords, or executing arbitrary Jython or Closure expressions, if those extensions are also present. The attacker must know a valid project ID of a project that contains at least one row. Version 3.8.3 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 28 Oct 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openrefine
Openrefine openrefine |
|
CPEs | cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:* | |
Vendors & Products |
Openrefine
Openrefine openrefine |
|
Metrics |
ssvc
|
Thu, 24 Oct 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the `export-rows` command can be used in such a way that it reflects part of the request verbatim, with a Content-Type header also taken from the request. An attacker could lead a user to a malicious page that submits a form POST that contains embedded JavaScript code. This code would then be included in the response, along with an attacker-controlled `Content-Type` header, and so potentially executed in the victim's browser as if it was part of OpenRefine. The attacker-provided code can do anything the user can do, including deleting projects, retrieving database passwords, or executing arbitrary Jython or Closure expressions, if those extensions are also present. The attacker must know a valid project ID of a project that contains at least one row. Version 3.8.3 fixes the issue. | |
Title | OpenRefine has a reflected cross-site scripting vulnerability from POST request in ExportRowsCommand | |
Weaknesses | CWE-348 CWE-79 |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-24T20:21:49.595Z
Updated: 2024-10-28T12:59:44.139Z
Reserved: 2024-10-04T16:00:09.630Z
Link: CVE-2024-47880
Vulnrichment
Updated: 2024-10-28T12:59:38.273Z
NVD
Status : Analyzed
Published: 2024-10-24T21:15:12.750
Modified: 2024-10-30T17:42:42.737
Link: CVE-2024-47880
Redhat
No data.