CVE-2024-30269

DataEase, an open source data visualization and analysis tool, has a database configuration information exposure vulnerability prior to version 2.5.0. Visiting the `/de2api/engine/getEngine;.js` path via a browser reveals that the platform's database configuration is returned. The vulnerability has been fixed in v2.5.0. No known workarounds are available aside from upgrading.
Configurations

No configuration.

History

21 Nov 2024, 09:11

Type Values Removed Values Added
References () https://github.com/dataease/dataease/releases/tag/v2.5.0 - () https://github.com/dataease/dataease/releases/tag/v2.5.0 -
References () https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5 - () https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5 -

08 Apr 2024, 18:48

Type Values Removed Values Added
Summary
  • (es) DataEase, una herramienta de análisis y visualización de datos de código abierto, tiene una vulnerabilidad de exposición de información de configuración de base de datos anterior a la versión 2.5.0. Visitar la ruta `/de2api/engine/getEngine;.js` a través de un navegador revela que se devuelve la configuración de la base de datos de la plataforma. La vulnerabilidad se ha solucionado en v2.5.0. No hay workarounds disponibles aparte de la actualización.

08 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-08 15:15

Updated : 2024-11-21 09:11


NVD link : CVE-2024-30269

Mitre link : CVE-2024-30269

CVE.ORG link : CVE-2024-30269


JSON object : View

Products Affected

No product.

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor