First published: Tue Sep 12 2023(Updated: )
### Summary An remote Code exec vulnerability allows any unauthenticated user to exec code on the server. ### Details Hi,Team, i find openrefine support to import data from database,When use mysql jdbc to connect to database,It is vulnerable to jdbc url attacks,for example,unauthenticated attacker can get rce on the server through the mysql userializable If the mysql-connector-java version used on the server side is less than 8.20. In order for the server to enable deserialization we need to set the `autoDeserialize` and `queryInterceptors` parameters in the connection string,As same with https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m, since the concatenation string is a direct concatenation, it is possible to inject the required parameters after the other parameters.  And there is a commons-beanutils dependency library on the server side, which contains an RCE-capable deserialization exploit chain ### PoC env: centos 7 openrefine 3.7.4 jdk11 mysql-connector-java version 8.14.0 you can use the tool https://github.com/4ra1n/mysql-fake-server to running a malicious mysql server. for example use the CB 1.9 Gadget to exec command `touch /tmp/hacked`.  set the `user` to `base64ZGVzZXJfQ0JfdG91Y2ggL3RtcC9oYWNrZWQ=`(`touch /tmp/hacked` base64 encode),`dataBaseName` to `test?autoDeserialize=true&queryInterceptors=com.mysql.cj.jdbc.interceptors.ServerStatusDiffInterceptor#`.   command `touch /tmp/hacked` is executed.  ### Impact An remote Code exec vulnerability allows any unauthenticated user to exec code on the server.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.openrefine:database | <=3.7.4 | 3.7.5 |
Openrefine Openrefine | <3.7.5 | |
debian/openrefine | 3.6.2-2+deb12u2 3.8.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenRefine vulnerability is CVE-2023-41887.
The severity of CVE-2023-41887 is critical with a CVSS score of 9.8.
This vulnerability in OpenRefine allows any unauthenticated user to execute arbitrary code on the server.
The affected software version is OpenRefine up to and including version 3.7.4.
To fix CVE-2023-41887, upgrade OpenRefine to version 3.7.5 or higher.