Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-qfwq-6jh6-8xx4: OpenRefine has a path traversal in LoadLanguageCommand

The load-language command expects a lang parameter from which it constructs the path of the localization file to load, of the form translations-$LANG.json. When doing so, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system.

The command should be patched by checking that the normalized path is in the expected directory.

ghsa
#js#git#java#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2024-49760

OpenRefine has a path traversal in LoadLanguageCommand

High severity GitHub Reviewed Published Oct 24, 2024 in OpenRefine/OpenRefine • Updated Oct 24, 2024

Package

maven org.openrefine:openrefine (Maven)

Affected versions

< 3.8.3

The load-language command expects a lang parameter from which it constructs the path of the localization file to load, of the form translations-$LANG.json.
When doing so, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system.

The command should be patched by checking that the normalized path is in the expected directory.

References

  • GHSA-qfwq-6jh6-8xx4
  • OpenRefine/OpenRefine@24d0840

Published to the GitHub Advisory Database

Oct 24, 2024

Last updated

Oct 24, 2024

ghsa: Latest News

GHSA-g5vw-3h65-2q3v: Access control vulnerable to user data deletion by anonynmous users