Article Details

Scrape Timestamp (UTC): 2023-10-02 08:06:38.638

Source: https://thehackernews.com/2023/10/openrefines-zip-slip-vulnerability.html

Original Article Text

Click to Toggle View

OpenRefine's Zip Slip Vulnerability Could Let Attackers Execute Malicious Code. A high-severity security flaw has been disclosed in the open-source OpenRefine data cleanup and transformation tool that could result in arbitrary code execution on affected systems. Tracked as CVE-2023-37476 (CVSS score: 7.8), the vulnerability is a Zip Slip vulnerability that could have adverse impacts when importing a specially crafted project in versions 3.7.3 and below. "Although OpenRefine is designed to only run locally on a user's machine, an attacker can trick a user into importing a malicious project file," Sonar security researcher Stefan Schiller said in a report published last week. "Once this file is imported, the attacker can execute arbitrary code on the user's machine." Software prone to Zip Slip vulnerabilities can pave the way for code execution by taking advantage of a directory traversal bug that an attacker can exploit to gain access to parts of the file system that should be out of reach otherwise. The attack is built on two moving parts: a malicious archive and extraction code that does not perform adequate validation checking, which can allow for overwriting files or unpacking them to unintended locations. The extracted files can either be invoked remotely by the adversary or by the system (or user), resulting in command execution on the victim's machine. The vulnerability identified in OpenRefine is along similar lines in that the "untar" method for extracting the files from the archive enables a bad actor to write files outside the destination folder by creating an archive with a file named "../../../../tmp/pwned." Following responsible disclosure on July 7, 2023, the vulnerability has been patched in version 3.7.4 released on July 17, 2023. "The vulnerability gives attackers a strong primitive: writing files with arbitrary content to an arbitrary location on the filesystem," Schiller said. "For applications running with root privileges, there are dozens of possibilities to turn this into arbitrary code execution on the operating system: adding a new user to the passwd file, adding an SSH key, creating a cron job, and more." The disclosure comes as proof-of-concept (PoC) exploit code has surfaced for a pair of now-patched flaws in Microsoft SharePoint Server – CVE-2023-29357 (CVSS score: 9.8) and CVE-2023-24955 (CVSS score: 7.2) – that could be chained to achieve privilege escalation and remote code execution. It also follows an alert from Cyfirma warning of a high-severity bug in Apache NiFi (CVE-2023-34468, CVSS score: 8.8) that allows remote code execution via malicious H2 database connection strings. It has been resolved in Apache NiFi 1.22.0. "The impact of this vulnerability is severe, as it grants attackers the ability to gain unauthorized access to systems, exfiltrate sensitive data, and execute malicious code remotely," the cybersecurity firm said. "An attacker could exploit this flaw to compromise data integrity, disrupt operations, and potentially cause financial and reputational damage."

Daily Brief Summary

MALWARE // High-Severity 'Zip Slip' Vulnerability Found in OpenRefine Data Cleanup Tool

A significant security flaw, known as a 'Zip Slip' vulnerability, has been discovered in the open-source data cleanup and transformation tool, OpenRefine, potentially allowing arbitrary code execution on systems that are impacted.

This vulnerability is labelled CVE-2023-37476 and has a CVSS score of 7.8. The flaw has serious implications, particularly in versions 3.7.3 and below, and when importing a carefully-crafted project.

The exploit is based on a directory traversal bug, which could potentially allow access to areas of the file system that ought to be inaccessible.

Users could be misled into importing a malicious project file, which an attacker could use to execute arbitrary code on the user's machine.

The vulnerability was responsibly disclosed on July 7, 2023 and has since been repaired in version 3.7.4, launched on July 17, 2023.

This comes in the wake of alerts about high-severity bugs in Microsoft SharePoint Server and Apache NiFi, all of which have now been patched. However, these types of flaws can cause significant damage by allowing unauthorized access, compromising data integrity and potentially causing financial and reputational harm if left unaddressed.