DataEase is an open source data visualization analysis tool. In Dataease, the PostgreSQL data source in the data source function can customize the JDBC connection parameters and the PG server target to be connected. In backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java, PgConfiguration class don't filter any parameters, directly concat user input. So, if the attacker adds some parameters in JDBC url, and connect to evil PG server, the attacker can trigger the PG jdbc deserialization vulnerability, and eventually the attacker can execute through the deserialization vulnerability system commands and obtain server privileges. The vulnerability has been fixed in v1.18.25.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dataease
Dataease dataease |
|
CPEs | cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:* | |
Vendors & Products |
Dataease
Dataease dataease |
|
Metrics |
cvssV3_1
|
Sat, 12 Oct 2024 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 11 Oct 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | DataEase is an open source data visualization analysis tool. In Dataease, the PostgreSQL data source in the data source function can customize the JDBC connection parameters and the PG server target to be connected. In backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java, PgConfiguration class don't filter any parameters, directly concat user input. So, if the attacker adds some parameters in JDBC url, and connect to evil PG server, the attacker can trigger the PG jdbc deserialization vulnerability, and eventually the attacker can execute through the deserialization vulnerability system commands and obtain server privileges. The vulnerability has been fixed in v1.18.25. | |
Title | Dataease PostgreSQL Data Source JDBC Connection Parameters Not Verified Leads to Deserialization Vulnerability | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-11T14:45:31.107Z
Updated: 2024-10-11T19:59:38.971Z
Reserved: 2024-09-17T17:42:37.029Z
Link: CVE-2024-47074
Vulnrichment
Updated: 2024-10-11T19:59:28.364Z
NVD
Status : Analyzed
Published: 2024-10-11T15:15:05.353
Modified: 2024-11-12T19:52:38.023
Link: CVE-2024-47074
Redhat
No data.