CVE-2024-23328
29.02.2024, 01:44
Dataease is an open source data visualization analysis tool. A deserialization vulnerability exists in the DataEase datasource, which can be exploited to execute arbitrary code. The location of the vulnerability code is `core/core-backend/src/main/java/io/dataease/datasource/type/Mysql.java.` The blacklist of mysql jdbc attacks can be bypassed and attackers can further exploit it for deserialized execution or reading arbitrary files. This vulnerability is patched in 1.18.15 and 2.3.0.Enginsight
| Vendor | Product | Version |
|---|---|---|
| dataease | dataease | 𝑥 < 1.18.15 |
| dataease | dataease | 2.0.0 ≤ 𝑥 < 2.3.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References