DataEase is an open source business analytics tool. Authenticated users can read and deserialize arbitrary files through the background JDBC connection. When constructing the jdbc connection string, the parameters are not filtered. This vulnerability has been fixed in v1.18.27. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/dataease/dataease/commit/0db4872a52eccf6e83dd9359aa05db52dd580ec1 | Patch |
https://github.com/dataease/dataease/security/advisories/GHSA-mrf3-9q84-rcmf | Exploit Vendor Advisory |
Configurations
History
20 Feb 2025, 16:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dataease/dataease/commit/0db4872a52eccf6e83dd9359aa05db52dd580ec1 - Patch | |
References | () https://github.com/dataease/dataease/security/advisories/GHSA-mrf3-9q84-rcmf - Exploit, Vendor Advisory | |
Summary |
|
|
CPE | cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:* | |
First Time |
Dataease
Dataease dataease |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
18 Dec 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-18 19:15
Updated : 2025-02-20 16:25
NVD link : CVE-2024-55953
Mitre link : CVE-2024-55953
CVE.ORG link : CVE-2024-55953
JSON object : View
Products Affected
dataease
- dataease
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')