Description
OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, lack of cross-site request forgery protection on the `preview-expression` command means that visiting a malicious website could cause an attacker-controlled expression to be executed. The expression can contain arbitrary Clojure or Python code. The attacker must know a valid project ID of a project that contains at least one row, and the attacker must convince the victim to open a malicious webpage. Version 3.8.3 fixes the issue.
Published: 2024-10-24
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2917 OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, lack of cross-site request forgery protection on the `preview-expression` command means that visiting a malicious website could cause an attacker-controlled expression to be executed. The expression can contain arbitrary Clojure or Python code. The attacker must know a valid project ID of a project that contains at least one row, and the attacker must convince the victim to open a malicious webpage. Version 3.8.3 fixes the issue.
Github GHSA Github GHSA GHSA-3jm4-c6qf-jrh3 OpenRefine's PreviewExpressionCommand, which is eval, lacks protection against cross-site request forgery (CSRF)
Ubuntu USN Ubuntu USN USN-7260-1 OpenRefine vulnerabilities
History

Fri, 25 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Openrefine
Openrefine openrefine
CPEs cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*
Vendors & Products Openrefine
Openrefine openrefine
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 24 Oct 2024 20:30:00 +0000

Type Values Removed Values Added
Description OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, lack of cross-site request forgery protection on the `preview-expression` command means that visiting a malicious website could cause an attacker-controlled expression to be executed. The expression can contain arbitrary Clojure or Python code. The attacker must know a valid project ID of a project that contains at least one row, and the attacker must convince the victim to open a malicious webpage. Version 3.8.3 fixes the issue.
Title OpenRefine's PreviewExpressionCommand, which is eval, lacks protection against cross-site request forgery (CSRF)
Weaknesses CWE-352
CWE-94
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L'}


Subscriptions

Openrefine Openrefine
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-10-25T15:24:58.242Z

Reserved: 2024-10-04T16:00:09.630Z

Link: CVE-2024-47879

cve-icon Vulnrichment

Updated: 2024-10-25T15:24:53.283Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-24T21:15:12.523

Modified: 2024-12-04T17:21:35.370

Link: CVE-2024-47879

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses