CVE-2024-23328

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-23328
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-23328.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-23328
Aliases
  • GHSA-8x8q-p622-jf25
Published
2024-02-01T15:40:24Z
Modified
2025-11-04T20:18:52.086146Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
The Dataease datasource exists deserialization and arbitrary file read vulnerability
Details

Dataease is an open source data visualization analysis tool. A deserialization vulnerability exists in the DataEase datasource, which can be exploited to execute arbitrary code. The location of the vulnerability code is core/core-backend/src/main/java/io/dataease/datasource/type/Mysql.java. The blacklist of mysql jdbc attacks can be bypassed and attackers can further exploit it for deserialized execution or reading arbitrary files. This vulnerability is patched in 1.18.15 and 2.3.0.

Database specific
{
    "cwe_ids": [
        "CWE-502"
    ]
}
References

Affected packages

Git / github.com/dataease/dataease

Affected ranges

Type
GIT
Repo
https://github.com/dataease/dataease
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "1.18.15"
        }
    ]
}
Type
GIT
Repo
https://github.com/dataease/dataease
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.0.0"
        },
        {
            "fixed": "2.3.0"
        }
    ]
}

Affected versions

v1.*

v1.0.0
v1.0.0-rc1
v1.0.0-rc2
v1.11.0
v1.11.1
v1.18.0
v1.18.1
v1.18.10
v1.18.11
v1.18.12
v1.18.13
v1.18.14
v1.18.2
v1.18.3
v1.18.4
v1.18.5
v1.18.6
v1.18.7
v1.18.8
v1.18.9
v1.2.0
v1.3.0
v1.5.0
v1.5.1
v1.5.2
v1.6.0
v1.8.0
v1.9.0