CWE
89
Advisory Published
CVE Published
Updated

CVE-2023-41887: Remote Code exec in project import with mysql jdbc url attack

First published: Tue Sep 12 2023(Updated: )

### Summary An remote Code exec vulnerability allows any unauthenticated user to exec code on the server. ### Details Hi,Team, i find openrefine support to import data from database,When use mysql jdbc to connect to database,It is vulnerable to jdbc url attacks,for example,unauthenticated attacker can get rce on the server through the mysql userializable If the mysql-connector-java version used on the server side is less than 8.20. In order for the server to enable deserialization we need to set the `autoDeserialize` and `queryInterceptors` parameters in the connection string,As same with https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m, since the concatenation string is a direct concatenation, it is possible to inject the required parameters after the other parameters. ![image](https://user-images.githubusercontent.com/24366795/262581108-e98dfe16-ee67-463f-8c49-7c318bf0d6f3.png) And there is a commons-beanutils dependency library on the server side, which contains an RCE-capable deserialization exploit chain ### PoC env: centos 7 openrefine 3.7.4 jdk11 mysql-connector-java version 8.14.0 you can use the tool https://github.com/4ra1n/mysql-fake-server to running a malicious mysql server. for example use the CB 1.9 Gadget to exec command `touch /tmp/hacked`. ![image](https://user-images.githubusercontent.com/24366795/262583287-7351a00a-32bf-4cb3-8d86-65ff0a112360.png) set the `user` to `base64ZGVzZXJfQ0JfdG91Y2ggL3RtcC9oYWNrZWQ=`(`touch /tmp/hacked` base64 encode),`dataBaseName` to `test?autoDeserialize=true&queryInterceptors=com.mysql.cj.jdbc.interceptors.ServerStatusDiffInterceptor#`. ![image](https://user-images.githubusercontent.com/24366795/262583657-9cfb9caa-02ed-4f6b-b110-650108803172.png) ![image](https://user-images.githubusercontent.com/24366795/262583815-a17d5530-bae8-4b4f-9392-4ea41b328c7d.png) command `touch /tmp/hacked` is executed. ![image](https://user-images.githubusercontent.com/24366795/262583979-823d5843-578f-4af6-b84f-a1422aa1b863.png) ### Impact An remote Code exec vulnerability allows any unauthenticated user to exec code on the server.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
maven/org.openrefine:database<=3.7.4
3.7.5
Openrefine Openrefine<3.7.5
debian/openrefine
3.6.2-2+deb12u2
3.8.7-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this OpenRefine vulnerability?

    The vulnerability ID for this OpenRefine vulnerability is CVE-2023-41887.

  • What is the severity of CVE-2023-41887?

    The severity of CVE-2023-41887 is critical with a CVSS score of 9.8.

  • How does this vulnerability affect OpenRefine?

    This vulnerability in OpenRefine allows any unauthenticated user to execute arbitrary code on the server.

  • What is the affected software version?

    The affected software version is OpenRefine up to and including version 3.7.4.

  • How can I fix CVE-2023-41887?

    To fix CVE-2023-41887, upgrade OpenRefine to version 3.7.5 or higher.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203