CVE-2024-49760

Source
https://cve.org/CVERecord?id=CVE-2024-49760
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49760.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-49760
Aliases
Downstream
Published
2024-10-24T21:35:28.932Z
Modified
2026-05-16T03:55:07.660593264Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N CVSS Calculator
Summary
OpenRefine has a path traversal in LoadLanguageCommand
Details

OpenRefine is a free, open source tool for working with messy data. The load-language command expects a lang parameter from which it constructs the path of the localization file to load, of the form translations-$LANG.json. But when doing so in versions prior to 3.8.3, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system. Version 3.8.3 addresses this issue.

Database specific
{
    "cwe_ids": [
        "CWE-22"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49760.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages