Vulnerability Details : CVE-2018-19859
OpenRefine before 3.2 beta allows directory traversal via a relative pathname in a ZIP archive.
Vulnerability category: Directory traversal
Products affected by CVE-2018-19859
- cpe:2.3:a:openrefine:openrefine:3.0:beta:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.7:rc1:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.6:alpha1:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.6:beta1:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.0:b1:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:3.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.8:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.5:rc3:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.6:rc2:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.0:a1:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.0:a2:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.0:a3:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.0:a4:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:3.1:beta:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.7:rc2:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.6:alpha2:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.7:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:openrefine:openrefine:1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-19859
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-19859
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:P/A:N |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2018-19859
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-19859
-
https://github.com/OpenRefine/OpenRefine/pull/1901
Fix zip slip vulnerability by wetneb · Pull Request #1901 · OpenRefine/OpenRefine · GitHubThird Party Advisory
-
https://github.com/OpenRefine/OpenRefine/issues/1840
Directory traversal (unsafe unzip) vulnerability · Issue #1840 · OpenRefine/OpenRefine · GitHubExploit;Third Party Advisory
Jump to