DataEase is an open source data visualization analysis tool. In Dataease users are normally allowed to modify data and the data sources are expected to properly sanitize data. The AWS redshift data source does not provide data sanitization which may lead to remote code execution. This vulnerability has been fixed in v1.18.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/dataease/dataease/security/advisories/GHSA-8wg2-9gwc-5fx2 | Exploit Vendor Advisory |
https://github.com/dataease/dataease/security/advisories/GHSA-8wg2-9gwc-5fx2 | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.0 |
References | () https://github.com/dataease/dataease/security/advisories/GHSA-8wg2-9gwc-5fx2 - Exploit, Vendor Advisory |
Information
Published : 2023-03-28 21:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28637
Mitre link : CVE-2023-28637
CVE.ORG link : CVE-2023-28637
JSON object : View
Products Affected
dataease
- dataease
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')