CVE-2024-55953

DataEase is an open source business analytics tool. Authenticated users can read and deserialize arbitrary files through the background JDBC connection. When constructing the jdbc connection string, the parameters are not filtered. This vulnerability has been fixed in v1.18.27. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*

History

20 Feb 2025, 16:25

Type Values Removed Values Added
References () https://github.com/dataease/dataease/commit/0db4872a52eccf6e83dd9359aa05db52dd580ec1 - () https://github.com/dataease/dataease/commit/0db4872a52eccf6e83dd9359aa05db52dd580ec1 - Patch
References () https://github.com/dataease/dataease/security/advisories/GHSA-mrf3-9q84-rcmf - () https://github.com/dataease/dataease/security/advisories/GHSA-mrf3-9q84-rcmf - Exploit, Vendor Advisory
Summary
  • (es) DataEase es una herramienta de análisis empresarial de código abierto. Los usuarios autenticados pueden leer y deserializar archivos arbitrarios a través de la conexión JDBC en segundo plano. Al construir la cadena de conexión JDBC, los parámetros no se filtran. Esta vulnerabilidad se ha corregido en la versión 1.18.27. Se recomienda a los usuarios que actualicen la versión. No existen workarounds conocidos para esta vulnerabilidad.
CPE cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*
First Time Dataease
Dataease dataease
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1

18 Dec 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-18 19:15

Updated : 2025-02-20 16:25


NVD link : CVE-2024-55953

Mitre link : CVE-2024-55953

CVE.ORG link : CVE-2024-55953


JSON object : View

Products Affected

dataease

  • dataease
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')