Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-37476
HistoryJul 17, 2023 - 12:00 a.m.

CVE-2023-37476

2023-07-1700:00:00
ubuntu.com
ubuntu.com
79
openrefine
cve-2023-37476
arbitrary code execution
update
trusted sources
data processing
vulnerability

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

25.5%

OpenRefine is a free, open source tool for data processing. A carefully
crafted malicious OpenRefine project tar file can be used to trigger
arbitrary code execution in the context of the OpenRefine process if a user
can be convinced to import it. The vulnerability exists in all versions of
OpenRefine up to and including 3.7.3. Users should update to OpenRefine
3.7.4 as soon as possible. Users unable to upgrade should only import
OpenRefine projects from trusted sources.

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

25.5%