DataEase, an open source data visualization and analysis tool, has a database configuration information exposure vulnerability prior to version 2.5.0. Visiting the `/de2api/engine/getEngine;.js` path via a browser reveals that the platform's database configuration is returned. The vulnerability has been fixed in v2.5.0. No known workarounds are available aside from upgrading.
References
Link | Resource |
---|---|
https://github.com/dataease/dataease/releases/tag/v2.5.0 | Release Notes |
https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5 | Vendor Advisory |
https://github.com/dataease/dataease/releases/tag/v2.5.0 | Release Notes |
https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5 | Vendor Advisory |
Configurations
History
12 Feb 2025, 17:50
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:* | |
First Time |
Dataease
Dataease dataease |
|
References | () https://github.com/dataease/dataease/releases/tag/v2.5.0 - Release Notes | |
References | () https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5 - Vendor Advisory |
Information
Published : 2024-04-08 15:15
Updated : 2025-02-12 17:50
NVD link : CVE-2024-30269
Mitre link : CVE-2024-30269
CVE.ORG link : CVE-2024-30269
JSON object : View
Products Affected
dataease
- dataease
CWE