GHSA-qfwq-6jh6-8xx4

Suggest an improvement
Source
https://github.com/advisories/GHSA-qfwq-6jh6-8xx4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-qfwq-6jh6-8xx4/GHSA-qfwq-6jh6-8xx4.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qfwq-6jh6-8xx4
Aliases
Published
2024-10-24T18:32:40Z
Modified
2024-10-25T17:07:44.571363Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N CVSS Calculator
Summary
OpenRefine has a path traversal in LoadLanguageCommand
Details

The load-language command expects a lang parameter from which it constructs the path of the localization file to load, of the form translations-$LANG.json. When doing so, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system.

The command should be patched by checking that the normalized path is in the expected directory.

References

Affected packages

Maven / org.openrefine:openrefine

Package

Name
org.openrefine:openrefine
View open source insights on deps.dev
Purl
pkg:maven/org.openrefine/openrefine

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8.3

Affected versions

3.*

3.6-beta1
3.6-beta2
3.6-rc1
3.6.0
3.6.1
3.6.2
3.7-beta1
3.7-beta2
3.7.0
3.7.2
3.8-beta1
3.8-beta5
3.8.0
3.8.1
3.8.2