Datart 1.0.0-rc.3 is vulnerable to Directory Traversal. The configuration file handling of the application allows attackers to upload arbitrary YAML files to the config/jdbc-driver-ext.yml path. The application parses this file using SnakeYAML's unsafe load() or loadAs() method without input sanitization. This allows deserialization of attacker-controlled YAML content, leading to arbitrary class instantiation. Under certain conditions, this can be exploited to achieve remote code execution (RCE).
Advisories
Source ID Title
EUVD EUVD EUVD-2025-31012 Datart 1.0.0-rc.3 is vulnerable to Directory Traversal. The configuration file handling of the application allows attackers to upload arbitrary YAML files to the config/jdbc-driver-ext.yml path. The application parses this file using SnakeYAML's unsafe load() or loadAs() method without input sanitization. This allows deserialization of attacker-controlled YAML content, leading to arbitrary class instantiation. Under certain conditions, this can be exploited to achieve remote code execution (RCE).
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 10 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Running-elephant
Running-elephant datart
CPEs cpe:2.3:a:running-elephant:datart:1.0.0:rc3:*:*:*:*:*:*
Vendors & Products Running-elephant
Running-elephant datart

Thu, 25 Sep 2025 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Datart
Datart datart
Vendors & Products Datart
Datart datart

Wed, 24 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
CWE-502
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 24 Sep 2025 16:45:00 +0000

Type Values Removed Values Added
Description Datart 1.0.0-rc.3 is vulnerable to Directory Traversal. The configuration file handling of the application allows attackers to upload arbitrary YAML files to the config/jdbc-driver-ext.yml path. The application parses this file using SnakeYAML's unsafe load() or loadAs() method without input sanitization. This allows deserialization of attacker-controlled YAML content, leading to arbitrary class instantiation. Under certain conditions, this can be exploited to achieve remote code execution (RCE).
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-09-24T17:18:26.606Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-56816

cve-icon Vulnrichment

Updated: 2025-09-24T17:16:52.826Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-24T17:15:41.450

Modified: 2025-10-10T21:06:27.993

Link: CVE-2025-56816

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-25T08:22:03Z