Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-41401 PoC — OpenRefine 代码问题漏洞

Source
Associated Vulnerability
Title:OpenRefine 代码问题漏洞 (CVE-2022-41401)
Description:OpenRefine是一款基于Java的开源工具。该产品主要用于加载数据、分析数据和清理数据等。 OpenRefine 3.5.2及之前版本存在安全漏洞,该漏洞源于存在服务器请求伪造(SSRF)漏洞。未授权攻击者可利用该漏洞访问内部资源,导致敏感文件泄露。
Readme
# OpenRefine <= v3.5.2 SSRF

[OpenRefine](https://github.com/OpenRefine/OpenRefine) v<=3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability, which permits unauthorized users to exploit the system, potentially leading to unauthorized access to internal resources and sensitive file disclosure.

The root cause of this vulnerability lies in OpenRefine's inadequate server-side validation of the supplied URL. While client-side validation exists, the server-side fails to perform the same level of scrutiny. Consequently, if a user initially provides a valid URI and then later substitutes it with a malicious one, the server-side system fails to detect the alteration.

# PoC 

This vulnerability can be leveraged during the process of creating a new project in OpenRefine. Specifically, by selecting the option to import a project from Web Addresses URLs, a malicious actor can insert a payload that enables them to access internal resources or read sensitive files.


![image](https://github.com/ixSly/CVE-2022-41401/assets/32583633/4d71ef1f-2f02-4b48-8c45-5be99f4f0433)


![image](https://github.com/ixSly/CVE-2022-41401/assets/32583633/df914755-f5eb-43d6-9638-ccdb5d8cb0c3)



# Disclosure Timeline

- Date of Discovery: 10/04/2022
- Reported to OpenRefine Security Team: 15/04/2022
- OpenRefine Team Acknowledgment: 23/05/2022
- Security Path Release: 07/07/2022
File Snapshot

[4.0K] /data/pocs/70e0d26200e43164d5d76859646aaa63c9edd653 └── [1.3K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.