OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the /extension/gdata/authorized endpoint includes the state GET parameter verbatim in a <script> tag in the output, so without escaping. An attacker could lead or redirect a user to a crafted URL containing JavaScript code, which would then cause that code to be executed in the victim's browser as if it was part of OpenRefine. Version 3.8.3 fixes this issue.
{
"cwe_ids": [
"CWE-79"
]
}[
{
"id": "CVE-2024-47878-463f1041",
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "main/src/com/google/refine/RefineServlet.java"
},
"source": "https://github.com/openrefine/openrefine/commit/d70d9114a8c021a233f0c13c73a0a7784276f2a4",
"digest": {
"line_hashes": [
"70741200116215552636185552063441350157",
"250578989153400506380281591621571840554",
"234825196224379482873151685641821868458",
"163240278076324717749431253028938753191"
],
"threshold": 0.9
},
"signature_version": "v1"
}
]