Dataease is an open source data visualization analysis tool. A deserialization vulnerability exists in the DataEase datasource, which can be exploited to execute arbitrary code. The location of the vulnerability code is `core/core-backend/src/main/java/io/dataease/datasource/type/Mysql.java.` The blacklist of mysql jdbc attacks can be bypassed and attackers can further exploit it for deserialized execution or reading arbitrary files. This vulnerability is patched in 1.18.15 and 2.3.0.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-02-01T15:40:24.236Z

Updated: 2024-02-01T15:40:24.236Z

Reserved: 2024-01-15T15:19:19.441Z


Link: CVE-2024-23328

JSON object: View

cve-icon NVD Information

Status : Awaiting Analysis

Published: 2024-02-29T01:44:08.483

Modified: 2024-02-29T13:49:29.390


Link: CVE-2024-23328

JSON object: View

cve-icon Redhat Information

No data.

CWE