cve-2024-23328
Vulnerability from cvelistv5
Published
2024-02-01 15:40
Modified
2024-08-28 16:36
Severity ?
EPSS score ?
Summary
Dataease is an open source data visualization analysis tool. A deserialization vulnerability exists in the DataEase datasource, which can be exploited to execute arbitrary code. The location of the vulnerability code is `core/core-backend/src/main/java/io/dataease/datasource/type/Mysql.java.` The blacklist of mysql jdbc attacks can be bypassed and attackers can further exploit it for deserialized execution or reading arbitrary files. This vulnerability is patched in 1.18.15 and 2.3.0.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:32.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/dataease/dataease/security/advisories/GHSA-8x8q-p622-jf25", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/dataease/dataease/security/advisories/GHSA-8x8q-p622-jf25" }, { "name": "https://github.com/dataease/dataease/commit/4128adf5fc4592b55fa1722a53b178967545d46a", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/dataease/dataease/commit/4128adf5fc4592b55fa1722a53b178967545d46a" }, { "name": "https://github.com/dataease/dataease/commit/bb540e6dc83df106ac3253f331066129a7487d1a", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/dataease/dataease/commit/bb540e6dc83df106ac3253f331066129a7487d1a" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dataease", "vendor": "dataease", "versions": [ { "lessThan": "1.18.15", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "2.3.0", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-23328", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-28T16:34:24.598958Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T16:36:41.670Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "dataease", "vendor": "dataease", "versions": [ { "status": "affected", "version": "\u003c 1.18.15" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Dataease is an open source data visualization analysis tool. A deserialization vulnerability exists in the DataEase datasource, which can be exploited to execute arbitrary code. The location of the vulnerability code is `core/core-backend/src/main/java/io/dataease/datasource/type/Mysql.java.` The blacklist of mysql jdbc attacks can be bypassed and attackers can further exploit it for deserialized execution or reading arbitrary files. This vulnerability is patched in 1.18.15 and 2.3.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502: Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-01T15:40:24.236Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/dataease/dataease/security/advisories/GHSA-8x8q-p622-jf25", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/dataease/dataease/security/advisories/GHSA-8x8q-p622-jf25" }, { "name": "https://github.com/dataease/dataease/commit/4128adf5fc4592b55fa1722a53b178967545d46a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/dataease/dataease/commit/4128adf5fc4592b55fa1722a53b178967545d46a" }, { "name": "https://github.com/dataease/dataease/commit/bb540e6dc83df106ac3253f331066129a7487d1a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/dataease/dataease/commit/bb540e6dc83df106ac3253f331066129a7487d1a" } ], "source": { "advisory": "GHSA-8x8q-p622-jf25", "discovery": "UNKNOWN" }, "title": "The Dataease datasource exists deserialization and arbitrary file read vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-23328", "datePublished": "2024-02-01T15:40:24.236Z", "dateReserved": "2024-01-15T15:19:19.441Z", "dateUpdated": "2024-08-28T16:36:41.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-23328\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-02-29T01:44:08.483\",\"lastModified\":\"2024-11-21T08:57:31.160\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Dataease is an open source data visualization analysis tool. A deserialization vulnerability exists in the DataEase datasource, which can be exploited to execute arbitrary code. The location of the vulnerability code is `core/core-backend/src/main/java/io/dataease/datasource/type/Mysql.java.` The blacklist of mysql jdbc attacks can be bypassed and attackers can further exploit it for deserialized execution or reading arbitrary files. This vulnerability is patched in 1.18.15 and 2.3.0.\"},{\"lang\":\"es\",\"value\":\"Dataease es una herramienta de an\u00e1lisis de visualizaci\u00f3n de datos de c\u00f3digo abierto. Existe una vulnerabilidad de deserializaci\u00f3n en la fuente de datos de DataEase, que puede explotarse para ejecutar c\u00f3digo arbitrario. La ubicaci\u00f3n del c\u00f3digo de vulnerabilidad es `core/core-backend/src/main/java/io/dataease/datasource/type/Mysql.java.` La lista negra de ataques jdbc de mysql se puede omitir y los atacantes pueden explotarla a\u00fan m\u00e1s para deserializarla. ejecuci\u00f3n o lectura de archivos arbitrarios. Esta vulnerabilidad est\u00e1 parcheada en 1.18.15 y 2.3.0.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"references\":[{\"url\":\"https://github.com/dataease/dataease/commit/4128adf5fc4592b55fa1722a53b178967545d46a\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/dataease/dataease/commit/bb540e6dc83df106ac3253f331066129a7487d1a\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/dataease/dataease/security/advisories/GHSA-8x8q-p622-jf25\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/dataease/dataease/commit/4128adf5fc4592b55fa1722a53b178967545d46a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/dataease/dataease/commit/bb540e6dc83df106ac3253f331066129a7487d1a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/dataease/dataease/security/advisories/GHSA-8x8q-p622-jf25\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.