CVE-2024-30269

DataEase, an open source data visualization and analysis tool, has a database configuration information exposure vulnerability prior to version 2.5.0. Visiting the `/de2api/engine/getEngine;.js` path via a browser reveals that the platform's database configuration is returned. The vulnerability has been fixed in v2.5.0. No known workarounds are available aside from upgrading.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*

History

12 Feb 2025, 17:50

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*
First Time Dataease
Dataease dataease
References () https://github.com/dataease/dataease/releases/tag/v2.5.0 - () https://github.com/dataease/dataease/releases/tag/v2.5.0 - Release Notes
References () https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5 - () https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5 - Vendor Advisory

Information

Published : 2024-04-08 15:15

Updated : 2025-02-12 17:50


NVD link : CVE-2024-30269

Mitre link : CVE-2024-30269

CVE.ORG link : CVE-2024-30269


JSON object : View

Products Affected

dataease

  • dataease
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo