Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.openrefine/openrefine
  4. ›
  5. GHSA-3pg4-qwc8-426r

GHSA-3pg4-qwc8-426r: OpenRefine leaks Google API credentials in releases

October 24, 2024

OpenRefine releases contain Google API authentication keys (“client id” and “client secret”) which can be extracted from released artifacts. For instance, download the package for OpenRefine 3.8.2 on linux. It contains the file openrefine-3.8.2/webapp/extensions/gdata/module/MOD-INF/lib/openrefine-gdata.jar, which can be extracted. This archive then contains the file com/google/refine/extension/gdata/GoogleAPIExtension.java, which contains the following lines:

References

  • github.com/OpenRefine/OpenRefine
  • github.com/OpenRefine/OpenRefine/commit/07dd61e00bb7f472ddcb243631299fba95ad90dd
  • github.com/OpenRefine/OpenRefine/security/advisories/GHSA-3pg4-qwc8-426r
  • github.com/advisories/GHSA-3pg4-qwc8-426r

Code Behaviors & Features

Detect and mitigate GHSA-3pg4-qwc8-426r with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.8.3

Fixed versions

  • 3.8.3

Solution

Upgrade to version 3.8.3 or above.

Weakness

  • CWE-522: Insufficiently Protected Credentials

Source file

maven/org.openrefine/openrefine/GHSA-3pg4-qwc8-426r.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 13 May 2025 12:14:36 +0000.