OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the built-in "Something went wrong!" error page includes the exception message and exception traceback without escaping HTML tags, enabling injection into the page if an attacker can reliably produce an error with an attacker-influenced message. It appears that the only way to reach this code in OpenRefine itself is for an attacker to somehow convince a victim to import a malicious file, which may be difficult. However, out-of-tree extensions may add their own calls to `respondWithErrorPage`. Version 3.8.3 has a fix for this issue.
Metrics
Affected Vendors & Products
References
History
Sat, 26 Oct 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openrefine
Openrefine openrefine |
|
CPEs | cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:* | |
Vendors & Products |
Openrefine
Openrefine openrefine |
|
Metrics |
ssvc
|
Thu, 24 Oct 2024 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the built-in "Something went wrong!" error page includes the exception message and exception traceback without escaping HTML tags, enabling injection into the page if an attacker can reliably produce an error with an attacker-influenced message. It appears that the only way to reach this code in OpenRefine itself is for an attacker to somehow convince a victim to import a malicious file, which may be difficult. However, out-of-tree extensions may add their own calls to `respondWithErrorPage`. Version 3.8.3 has a fix for this issue. | |
Title | OpenRefine's error page lacks escaping, leading to potential Cross-site Scripting on import of malicious project | |
Weaknesses | CWE-79 CWE-81 |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-24T20:35:30.254Z
Updated: 2024-10-25T19:25:18.385Z
Reserved: 2024-10-04T16:00:09.631Z
Link: CVE-2024-47882
Vulnrichment
Updated: 2024-10-25T19:23:10.771Z
NVD
Status : Analyzed
Published: 2024-10-24T21:15:13.160
Modified: 2024-10-28T14:26:11.707
Link: CVE-2024-47882
Redhat
No data.