Page 3 of 15 results (0.008 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability, which permits unauthorized users to exploit the system, potentially leading to unauthorized access to internal resources and sensitive file disclosure. OpenRefine contiene una vulnerabilidad de Server-Side Request Forgery (SSRF) que afecta a las versiones 3.5.2 e inferiores. Esto permite a usuarios no autorizados explotar el sistema, llevando potencialmente al acceso no autorizado a recursos internos y a la divulgación de archivos sensibles. • https://github.com/ixSly/CVE-2022-41401 https://github.com/OpenRefine/OpenRefine/blob/30d6edb7b6586623bda09456c797c35983fb80ff/main/tests/server/src/com/google/refine/importing/ImportingUtilitiesTests.java#L180 https://github.com/OpenRefine/OpenRefine/blob/cb55cdfdf6f9ca916839778dc847cce803688998/main/src/com/google/refine/importing/ImportingUtilities.java#L103 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

OpenRefine is a free, open source tool for data processing. A carefully crafted malicious OpenRefine project tar file can be used to trigger arbitrary code execution in the context of the OpenRefine process if a user can be convinced to import it. The vulnerability exists in all versions of OpenRefine up to and including 3.7.3. Users should update to OpenRefine 3.7.4 as soon as possible. Users unable to upgrade should only import OpenRefine projects from trusted sources. • https://github.com/OpenRefine/OpenRefine/commit/e9c1e65d58b47aec8cd676bd5c07d97b002f205e https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-m88m-crr9-jvqq • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

OpenRefine through 3.1 allows arbitrary file write because Directory Traversal can occur during the import of a crafted project file. OpenRefine hasta la versión 3.1 permite la escritura de archivos arbitrarios debido a que pueden ocurrir saltos de directorio durante la importación de un archivo de proyecto manipulado. • https://github.com/OpenRefine/OpenRefine/issues/1927 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The data import functionality in OpenRefine through 3.1 allows an XML External Entity (XXE) attack through a crafted (zip) file, allowing attackers to read arbitrary files. La funcionalidad de importación de datos en OpenRefine hasta la versión 3.1 permite un ataque XEE (XML External Entity) mediante un archivo (zip) manipulado, lo que permite que los atacantes lean archivos arbitrarios. • https://github.com/OpenRefine/OpenRefine/issues/1907 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 6.5EPSS: 0%CPEs: 33EXPL: 2

OpenRefine before 3.2 beta allows directory traversal via a relative pathname in a ZIP archive. OpenRefine, en versiones anteriores a la 3.2 beta, permite saltos de directorio mediante un nombre de ruta relativa en un archivo ZIP • https://github.com/WhiteOakSecurity/CVE-2018-19859 https://github.com/OpenRefine/OpenRefine/issues/1840 https://github.com/OpenRefine/OpenRefine/pull/1901 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •