OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the `export-rows` command can be used in such a way that it reflects part of the request verbatim, with a Content-Type header also taken from the request. An attacker could lead a user to a malicious page that submits a form POST that contains embedded JavaScript code. This code would then be included in the response, along with an attacker-controlled `Content-Type` header, and so potentially executed in the victim's browser as if it was part of OpenRefine. The attacker-provided code can do anything the user can do, including deleting projects, retrieving database passwords, or executing arbitrary Jython or Closure expressions, if those extensions are also present. The attacker must know a valid project ID of a project that contains at least one row. Version 3.8.3 fixes the issue.
History

Mon, 28 Oct 2024 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Openrefine
Openrefine openrefine
CPEs cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*
Vendors & Products Openrefine
Openrefine openrefine
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 24 Oct 2024 20:30:00 +0000

Type Values Removed Values Added
Description OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the `export-rows` command can be used in such a way that it reflects part of the request verbatim, with a Content-Type header also taken from the request. An attacker could lead a user to a malicious page that submits a form POST that contains embedded JavaScript code. This code would then be included in the response, along with an attacker-controlled `Content-Type` header, and so potentially executed in the victim's browser as if it was part of OpenRefine. The attacker-provided code can do anything the user can do, including deleting projects, retrieving database passwords, or executing arbitrary Jython or Closure expressions, if those extensions are also present. The attacker must know a valid project ID of a project that contains at least one row. Version 3.8.3 fixes the issue.
Title OpenRefine has a reflected cross-site scripting vulnerability from POST request in ExportRowsCommand
Weaknesses CWE-348
CWE-79
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-10-24T20:21:49.595Z

Updated: 2024-10-28T12:59:44.139Z

Reserved: 2024-10-04T16:00:09.630Z

Link: CVE-2024-47880

cve-icon Vulnrichment

Updated: 2024-10-28T12:59:38.273Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-24T21:15:12.750

Modified: 2024-10-30T17:42:42.737

Link: CVE-2024-47880

cve-icon Redhat

No data.