OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the built-in "Something went wrong!" error page includes the exception message and exception traceback without escaping HTML tags, enabling injection into the page if an attacker can reliably produce an error with an attacker-influenced message. It appears that the only way to reach this code in OpenRefine itself is for an attacker to somehow convince a victim to import a malicious file, which may be difficult. However, out-of-tree extensions may add their own calls to `respondWithErrorPage`. Version 3.8.3 has a fix for this issue.
History

Sat, 26 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Openrefine
Openrefine openrefine
CPEs cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*
Vendors & Products Openrefine
Openrefine openrefine
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 24 Oct 2024 20:45:00 +0000

Type Values Removed Values Added
Description OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the built-in "Something went wrong!" error page includes the exception message and exception traceback without escaping HTML tags, enabling injection into the page if an attacker can reliably produce an error with an attacker-influenced message. It appears that the only way to reach this code in OpenRefine itself is for an attacker to somehow convince a victim to import a malicious file, which may be difficult. However, out-of-tree extensions may add their own calls to `respondWithErrorPage`. Version 3.8.3 has a fix for this issue.
Title OpenRefine's error page lacks escaping, leading to potential Cross-site Scripting on import of malicious project
Weaknesses CWE-79
CWE-81
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-10-24T20:35:30.254Z

Updated: 2024-10-25T19:25:18.385Z

Reserved: 2024-10-04T16:00:09.631Z

Link: CVE-2024-47882

cve-icon Vulnrichment

Updated: 2024-10-25T19:23:10.771Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-24T21:15:13.160

Modified: 2024-10-28T14:26:11.707

Link: CVE-2024-47882

cve-icon Redhat

No data.