Server-Side Request Forgery (SSRF) Affecting openrefine package, versions <3.6.1-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.12% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-OPENREFINE-5843383
  • published16 Aug 2023
  • disclosed4 Aug 2023

Introduced: 4 Aug 2023

CVE-2022-41401  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade Debian:unstable openrefine to version 3.6.1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openrefine package and not the openrefine package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability, which permits unauthorized users to exploit the system, potentially leading to unauthorized access to internal resources and sensitive file disclosure.

CVSS Scores

version 3.1