Dataease is an open source data visualization analysis tool. A deserialization vulnerability exists in the DataEase datasource, which can be exploited to execute arbitrary code. The location of the vulnerability code is `core/core-backend/src/main/java/io/dataease/datasource/type/Mysql.java.` The blacklist of mysql jdbc attacks can be bypassed and attackers can further exploit it for deserialized execution or reading arbitrary files. This vulnerability is patched in 1.18.15 and 2.3.0.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-02-01T15:40:24.236Z

Updated: 2024-08-28T16:36:41.670Z

Reserved: 2024-01-15T15:19:19.441Z

Link: CVE-2024-23328

cve-icon Vulnrichment

Updated: 2024-08-01T22:59:32.197Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-02-29T01:44:08.483

Modified: 2024-02-29T13:49:29.390

Link: CVE-2024-23328

cve-icon Redhat

No data.