Vulnerability Description
DataEase is an open source business analytics tool. Authenticated users can read and deserialize arbitrary files through the background JDBC connection. When constructing the jdbc connection string, the parameters are not filtered. This vulnerability has been fixed in v1.18.27. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dataease | Dataease | < 1.18.27 |
Related Weaknesses (CWE)
References
- https://github.com/dataease/dataease/commit/0db4872a52eccf6e83dd9359aa05db52dd58Patch
- https://github.com/dataease/dataease/security/advisories/GHSA-mrf3-9q84-rcmfExploitVendor Advisory
FAQ
What is CVE-2024-55953?
CVE-2024-55953 is a vulnerability with a CVSS score of 8.1 (HIGH). DataEase is an open source business analytics tool. Authenticated users can read and deserialize arbitrary files through the background JDBC connection. When constructing the jdbc connection string, t...
How severe is CVE-2024-55953?
CVE-2024-55953 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-55953?
Check the references section above for vendor advisories and patch information. Affected products include: Dataease Dataease.