Show filters
31 Total Results
Displaying 21-30 of 31
Sort by:
Attacker Value
Unknown

CVE-2023-28637

Disclosure Date: March 28, 2023 (last updated February 24, 2025)
DataEase is an open source data visualization analysis tool. In Dataease users are normally allowed to modify data and the data sources are expected to properly sanitize data. The AWS redshift data source does not provide data sanitization which may lead to remote code execution. This vulnerability has been fixed in v1.18.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Attacker Value
Unknown

CVE-2023-28437

Disclosure Date: March 25, 2023 (last updated February 24, 2025)
Dataease is an open source data visualization and analysis tool. The blacklist for SQL injection protection is missing entries. This vulnerability has been fixed in version 1.18.5. There are no known workarounds.
Attacker Value
Unknown

CVE-2023-28435

Disclosure Date: March 24, 2023 (last updated February 24, 2025)
Dataease is an open source data visualization and analysis tool. The permissions for the file upload interface is not checked so users who are not logged in can upload directly to the background. The file type also goes unchecked, users could upload any type of file. These vulnerabilities has been fixed in version 1.18.5.
Attacker Value
Unknown

CVE-2023-25807

Disclosure Date: February 28, 2023 (last updated February 24, 2025)
DataEase is an open source data visualization and analysis tool. When saving a dashboard on the DataEase platform saved data can be modified and store malicious code. This vulnerability can lead to the execution of malicious code stored by the attacker on the server side when the user accesses the dashboard. The vulnerability has been fixed in version 1.18.3.
Attacker Value
Unknown

CVE-2021-38239

Disclosure Date: February 15, 2023 (last updated February 24, 2025)
SQL Injection vulnerability in dataease before 1.2.0, allows attackers to gain sensitive information via the orders parameter to /api/sys_msg/list/1/10.
Attacker Value
Unknown

CVE-2022-39312

Disclosure Date: October 25, 2022 (last updated February 24, 2025)
Dataease is an open source data visualization analysis tool. Dataease prior to 1.15.2 has a deserialization vulnerability. In Dataease, the Mysql data source in the data source function can customize the JDBC connection parameters and the Mysql server target to be connected. In `backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java`, the `MysqlConfiguration` class does not filter any parameters. If an attacker adds some parameters to a JDBC url and connects to a malicious mysql server, the attacker can trigger the mysql jdbc deserialization vulnerability. Through the deserialization vulnerability, the attacker can execute system commands and obtain server privileges. Version 1.15.2 contains a patch for this issue.
Attacker Value
Unknown

CVE-2022-34114

Disclosure Date: July 22, 2022 (last updated February 24, 2025)
Dataease v1.11.1 was discovered to contain a SQL injection vulnerability via the parameter dataSourceId.
Attacker Value
Unknown

CVE-2022-34113

Disclosure Date: July 22, 2022 (last updated October 07, 2023)
An issue in the component /api/plugin/upload of Dataease v1.11.1 allows attackers to execute arbitrary code via a crafted plugin.
Attacker Value
Unknown

CVE-2022-34112

Disclosure Date: July 22, 2022 (last updated February 24, 2025)
An access control issue in the component /api/plugin/uninstall Dataease v1.11.1 allows attackers to arbitrarily uninstall the plugin, a right normally reserved for the administrator.
Attacker Value
Unknown

CVE-2022-34115

Disclosure Date: July 22, 2022 (last updated February 24, 2025)
DataEase v1.11.1 was discovered to contain a arbitrary file write vulnerability via the parameter dataSourceId.