Due to the newer MySQL driver library in the latest version of OpenRefine (8.0.30), there is no associated deserialization utilization point, so original code execution cannot be achieved, but attackers can use this vulnerability to read sensitive files on the target server.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.openrefine:database | maven | <= 3.7.7 | 3.7.8 |
The vulnerability stems from two key functions: 1) setDatabaseHost's lack of input validation allowed injecting MySQL connection parameters through special characters, as shown in the PoC's malicious host string. 2) getConnection's URL construction used this tainted host value without additional sanitization, creating a vulnerable JDBC connection string. The patch specifically adds validation to setDatabaseHost, confirming its central role in the vulnerability. The multi-host syntax exploitation in MySQL JDBC (documented in MySQL connector docs) makes the connection handling in getConnection a necessary component of the attack chain.
KEV Misses 88% of Exploited CVEs- Get the report