CVE-2024-47882

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-47882
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47882.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-47882
Aliases
Related
Published
2024-10-24T21:15:13Z
Modified
2024-10-28T15:45:54.719234Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the built-in "Something went wrong!" error page includes the exception message and exception traceback without escaping HTML tags, enabling injection into the page if an attacker can reliably produce an error with an attacker-influenced message. It appears that the only way to reach this code in OpenRefine itself is for an attacker to somehow convince a victim to import a malicious file, which may be difficult. However, out-of-tree extensions may add their own calls to respondWithErrorPage. Version 3.8.3 has a fix for this issue.

References

Affected packages

Debian:12 / openrefine

Package

Name
openrefine
Purl
pkg:deb/debian/openrefine?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.6.2-2
3.6.2-2+deb12u1
3.6.2-2+deb12u2
3.6.2-3
3.7.4-1
3.7.5-1
3.7.6-1
3.7.7-1
3.7.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / openrefine

Package

Name
openrefine
Purl
pkg:deb/debian/openrefine?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.6.2-2
3.6.2-3
3.7.4-1
3.7.5-1
3.7.6-1
3.7.7-1
3.7.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/openrefine/openrefine

Affected ranges

Type
GIT
Repo
https://github.com/openrefine/openrefine
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.1

2.*

2.6-alpha.2
2.6-alpha1
2.6-beta.1
2.6-rc.2
2.7
2.7-rc.1
2.7-rc.2
2.8

3.*

3.0
3.0-beta
3.0-rc.1
3.1
3.1-beta
3.2
3.2-beta
3.3
3.3-beta
3.3-rc1
3.4-beta
3.5-beta1
3.7-beta2
3.8-beta1

v2.*

v2.6-rc1