CVE-2024-49760: OpenRefine has a path traversal in LoadLanguageCommand
(updated )
The load-language command expects a lang
parameter from which it constructs the path of the localization file to load, of the form translations-$LANG.json
.
When doing so, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system.
The command should be patched by checking that the normalized path is in the expected directory.
References
Detect and mitigate CVE-2024-49760 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →