Arbitrary Code Injection Affecting org.openrefine:database package, versions [3.4-beta,3.8.3)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.09% (39th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGOPENREFINE-8304145
- published 25 Oct 2024
- disclosed 24 Oct 2024
- credit Unknown
Introduced: 24 Oct 2024
CVE-2024-47881 Open this link in a new tabHow to fix?
Upgrade org.openrefine:database
to version 3.8.3 or higher.
Overview
Affected versions of this package are vulnerable to Arbitrary Code Injection via the enable_load_extension
property in the SQLite integration due to improper user input sanitization in the getDatabaseUrl
function. An attacker can execute arbitrary code on the server by loading malicious DLLs through crafted JDBC URLs.
Workaround
This vulnerability can be mitigated by setting enable_load_extension
to off, using the READONLY open mode, and enforcing stricter security limits.