Vulnerability Description
Dataease is an open source data visualization analysis tool. Prior to 2.10.20, By controlling the IniFile parameter, an attacker can force the JDBC driver to load an attacker-controlled configuration file. This configuration file can inject dangerous JDBC properties, leading to remote code execution. The Redshift JDBC driver execution flow reaches a method named getJdbcIniFile. The getJdbcIniFile method implements an aggressive automatic configuration file discovery mechanism. If not explicitly restricted, it searches for a file named rsjdbc.ini. In a JDBC URL context, users can explicitly specify the configuration file via URL parameters, which allows arbitrary files on the server to be loaded as JDBC configuration files. Within the Redshift JDBC driver properties, the parameter IniFile is explicitly supported and used to load an external configuration file. This vulnerability is fixed in 2.10.20.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dataease | Dataease | < 2.10.20 |
Related Weaknesses (CWE)
References
- https://github.com/dataease/dataease/security/advisories/GHSA-jc9q-3jfw-mch4ExploitVendor Advisory
- https://github.com/dataease/dataease/security/advisories/GHSA-jc9q-3jfw-mch4ExploitVendor Advisory
FAQ
What is CVE-2026-32140?
CVE-2026-32140 is a vulnerability with a CVSS score of 8.8 (HIGH). Dataease is an open source data visualization analysis tool. Prior to 2.10.20, By controlling the IniFile parameter, an attacker can force the JDBC driver to load an attacker-controlled configuration ...
How severe is CVE-2026-32140?
CVE-2026-32140 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32140?
Check the references section above for vendor advisories and patch information. Affected products include: Dataease Dataease.