DataEase is an open source data visualization analysis tool that helps users quickly analyze data and gain insights into business trends. In affected versions a the lack of signature verification of jwt tokens allows attackers to forge jwts which then allow access to any interface. The vulnerability has been fixed in v2.10.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/dataease/dataease/security/advisories/GHSA-5jr4-wrm2-xj36 | Exploit Vendor Advisory |
Configurations
History
20 Feb 2025, 16:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dataease/dataease/security/advisories/GHSA-5jr4-wrm2-xj36 - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
CPE | cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:* | |
First Time |
Dataease
Dataease dataease |
Information
Published : 2024-11-07 18:15
Updated : 2025-02-20 16:20
NVD link : CVE-2024-47073
Mitre link : CVE-2024-47073
CVE.ORG link : CVE-2024-47073
JSON object : View
Products Affected
dataease
- dataease
CWE
CWE-347
Improper Verification of Cryptographic Signature