fkie_cve-2018-19859
Vulnerability from fkie_nvd
Published
2018-12-05 11:29
Modified
2024-11-21 03:58
Summary
OpenRefine before 3.2 beta allows directory traversal via a relative pathname in a ZIP archive.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB7C6E44-CB6F-4AE0-9982-8457ED7EE6D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "1A0827B9-9056-45A5-BDFB-7BE3EDCF10EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.0:a2:*:*:*:*:*:*",
              "matchCriteriaId": "4F147D09-64C4-40B9-88A0-A097EA62AD13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.0:a3:*:*:*:*:*:*",
              "matchCriteriaId": "B6569329-53A3-4D90-8328-18276D3CAA4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.0:a4:*:*:*:*:*:*",
              "matchCriteriaId": "6FF3875E-A97A-4354-A39E-10022EC0902D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "3F8014F6-DAAF-4631-8C9D-DEE7E9B6A5EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C3EAA1-0AD7-4004-9788-48DE1CF17483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F035F2FB-D8D1-49CE-A5AA-6E910EBABA61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D961CF4-24DC-4590-B894-7F01B9FF53D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "306A9FE4-0710-4FDA-80E5-424F2C923907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C4D4F50-0EE3-442E-9321-F50EE53FF16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FAB24CE-31D4-44CA-984B-DFFE01A22FD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C56995D-DF2A-4554-B2A9-9E0DE3E00FAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "158695EA-58D9-44B3-AB27-31241B238A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6E29E45-2A4C-4F33-BE54-2DF9AA871744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "BD5A5217-9198-4093-870D-A0F9D1A049C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FBA67D1-5E4A-4379-AB62-F00F0B46E010",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C5A12929-5B45-4BAF-846D-D5AF0485E506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.5:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "3F7CFB6A-E81B-4183-9719-C64CE2D2151F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.6:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "6393B172-1F75-42C0-9DA2-38BC07BFB5CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.6:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "79AEAD0E-66F4-47DE-9677-E7E2E283A509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.6:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "1F7BAD71-EEBE-4C67-8B9F-113BA9174165",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B036F357-C459-42B8-87CC-FCEA59FD75AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BA3DCF17-B326-4EB0-88D1-E42A264E4EE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "12D275BA-D34D-442E-BB6B-57FDB7687B0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9B625835-76F6-48C5-BDE9-A9E93066FCC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9F1403C6-7658-408E-9715-EFE38628D52A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8296CE90-17CA-4484-AA5B-6538DFD70967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E811B1A3-A6FD-44D3-8CCE-F88D7FC789C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:3.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "D423C971-A491-47A2-BCA5-34FB937F4190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3D00B374-A67C-4D74-9BEA-34C251366C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9ADDD1-7321-4EDA-8E3B-11A67EC8C18C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openrefine:openrefine:3.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "222E3A35-47DC-40C2-A570-4AB87C3C2B65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenRefine before 3.2 beta allows directory traversal via a relative pathname in a ZIP archive."
    },
    {
      "lang": "es",
      "value": "OpenRefine, en versiones anteriores a la 3.2 beta, permite saltos de directorio mediante un nombre de ruta relativa en un archivo ZIP"
    }
  ],
  "id": "CVE-2018-19859",
  "lastModified": "2024-11-21T03:58:42.063",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-12-05T11:29:05.890",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/OpenRefine/OpenRefine/issues/1840"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/OpenRefine/OpenRefine/pull/1901"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/OpenRefine/OpenRefine/issues/1840"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/OpenRefine/OpenRefine/pull/1901"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…