UBUNTU-CVE-2023-37476

Source
https://ubuntu.com/security/CVE-2023-37476
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-37476.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-37476
Related
Published
2023-07-17T22:15:00Z
Modified
2024-10-15T14:11:38Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

OpenRefine is a free, open source tool for data processing. A carefully crafted malicious OpenRefine project tar file can be used to trigger arbitrary code execution in the context of the OpenRefine process if a user can be convinced to import it. The vulnerability exists in all versions of OpenRefine up to and including 3.7.3. Users should update to OpenRefine 3.7.4 as soon as possible. Users unable to upgrade should only import OpenRefine projects from trusted sources.

References

Affected packages

Ubuntu:22.04:LTS / openrefine

Package

Name
openrefine
Purl
pkg:deb/ubuntu/openrefine?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.5.2-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / openrefine

Package

Name
openrefine
Purl
pkg:deb/ubuntu/openrefine?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.7.7-1
3.7.8-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / openrefine

Package

Name
openrefine
Purl
pkg:deb/ubuntu/openrefine?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.6.2-3
3.7.6-1
3.7.7-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}