First published: Mon Jul 17 2023(Updated: )
OpenRefine is a free, open source tool for data processing. A carefully crafted malicious OpenRefine project tar file can be used to trigger arbitrary code execution in the context of the OpenRefine process if a user can be convinced to import it. The vulnerability exists in all versions of OpenRefine up to and including 3.7.3. Users should update to OpenRefine 3.7.4 as soon as possible. Users unable to upgrade should only import OpenRefine projects from trusted sources.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openrefine Openrefine | <=3.7.3 | |
maven/org.openrefine:main | <3.7.4 | 3.7.4 |
debian/openrefine | 3.6.2-2+deb12u2 3.8.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
A carefully crafted malicious OpenRefine project tar file can be used to trigger arbitrary code execution if a user can be convinced to import it.
Users should update to OpenRefine 3.7.4.
All versions of OpenRefine up to and including 3.7.3 are affected.
The severity of CVE-2023-37476 is high with a CVSS score of 7.8.
The Common Weakness Enumeration (CWE) for CVE-2023-37476 is CWE-22.