Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-47883 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Butterfly (OpenRefine module) mishandles the `file://` protocol in URLs. πŸ“‰ **Consequences**: Path Traversal, SSRF, and XSS attacks. Critical integrity loss!

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-36 (Relative Path Traversal). The framework fails to sanitize or validate file paths derived from URL inputs. πŸ› **Flaw**: Improper handling of `file` protocol schemes.

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: OpenRefine. πŸ“¦ **Product**: simile-butterfly. ⚠️ **Affected**: Versions **prior to 1.2.6**. If you are on 1.2.5 or lower, you are at risk!

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: 1. Read arbitrary server files (Path Traversal). 2. Force server to make requests to internal networks (SSRF). 3. Inject malicious scripts (XSS).…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: LOW. 🌐 **Network**: Remote (AV:N). πŸ”‘ **Auth**: None required (PR:N). πŸ‘€ **UI**: None required (UI:N). ⚑ **Complexity**: Low (AC:L). Easy to exploit!

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp?**: No specific PoC code provided in the data. However, the vulnerability type (Path Traversal/SSRF) is well-known. Wild exploitation is likely possible for skilled attackers. πŸ•΅οΈβ€β™‚οΈ

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check Butterfly version (< 1.2.6). 2. Scan for `file://` protocol usage in URL parameters. 3. Look for directory traversal patterns (`../`) in logs. 4.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed?**: YES. πŸ“… **Patch Date**: 2024-10-24. πŸ”— **Fix**: Upgrade to **Butterfly 1.2.6** or later. See GitHub Advisory GHSA-3p8v-w8mr-m3x8 for details.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: 1. **Block Input**: Whitelist allowed protocols (disable `file://`). 2. **WAF**: Deploy rules to block `../` sequences and `file://` schemes. 3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. πŸ“Š **CVSS**: High severity (C:H, I:H). πŸš€ **Action**: Patch immediately. Remote, unauthenticated exploitation makes this a critical priority for any OpenRefine deployment.