UBUNTU-CVE-2024-47881

See a problem?
Source
https://ubuntu.com/security/CVE-2024-47881
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-47881.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-47881
Related
Published
2024-10-24T21:15:00Z
Modified
2024-10-30T16:31:00Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

OpenRefine is a free, open source tool for working with messy data. Starting in version 3.4-beta and prior to version 3.8.3, in the database extension, the "enableloadextension" property can be set for the SQLite integration, enabling an attacker to load (local or remote) extension DLLs and so run arbitrary code on the server. The attacker needs to have network access to the OpenRefine instance. Version 3.8.3 fixes this issue.

References

Affected packages

Ubuntu:22.04:LTS / openrefine

Package

Name
openrefine
Purl
pkg:deb/ubuntu/openrefine?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.5.2-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / openrefine

Package

Name
openrefine
Purl
pkg:deb/ubuntu/openrefine?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.7.7-1
3.7.8-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / openrefine

Package

Name
openrefine
Purl
pkg:deb/ubuntu/openrefine?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.6.2-3
3.7.6-1
3.7.7-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}