DataEase is an open source data visualization analysis tool. In Dataease, the PostgreSQL data source in the data source function can customize the JDBC connection parameters and the PG server target to be connected. In backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java, PgConfiguration class don't filter any parameters, directly concat user input. So, if the attacker adds some parameters in JDBC url, and connect to evil PG server, the attacker can trigger the PG jdbc deserialization vulnerability, and eventually the attacker can execute through the deserialization vulnerability system commands and obtain server privileges. The vulnerability has been fixed in v1.18.25.
References
Configurations
History
12 Nov 2024, 19:52
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dataease
Dataease dataease |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:* | |
References | () https://github.com/dataease/dataease/commit/86eafc4d77f0bbc0eaa7fc58e5076a085257f259 - Patch | |
References | () https://github.com/dataease/dataease/security/advisories/GHSA-jgg7-w629-wcpc - Vendor Advisory |
15 Oct 2024, 12:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Oct 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-11 15:15
Updated : 2024-11-12 19:52
NVD link : CVE-2024-47074
Mitre link : CVE-2024-47074
CVE.ORG link : CVE-2024-47074
JSON object : View
Products Affected
dataease
- dataease
CWE
CWE-502
Deserialization of Untrusted Data