CVE-2023-28435 – Dataease file upload interface does not verify permission or file type
https://notcve.org/view.php?id=CVE-2023-28435
Dataease is an open source data visualization and analysis tool. The permissions for the file upload interface is not checked so users who are not logged in can upload directly to the background. The file type also goes unchecked, users could upload any type of file. These vulnerabilities has been fixed in version 1.18.5. • https://github.com/dataease/dataease/issues/4798 https://github.com/dataease/dataease/security/advisories/GHSA-625h-q3g9-rffc • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2023-25807 – DataEase dashboard has a stored XSS vulnerability
https://notcve.org/view.php?id=CVE-2023-25807
DataEase is an open source data visualization and analysis tool. When saving a dashboard on the DataEase platform saved data can be modified and store malicious code. This vulnerability can lead to the execution of malicious code stored by the attacker on the server side when the user accesses the dashboard. The vulnerability has been fixed in version 1.18.3. • https://github.com/dataease/dataease/commit/cc94fb8e69ddbb37c96d02ec0f0ddcd74273ef49 https://github.com/dataease/dataease/security/advisories/GHSA-xj3h-3wmw-j5vf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-39312 – Dataease Mysql Data Source JDBC Connection Parameters Not Verified Leads to Deserialization Vulnerability
https://notcve.org/view.php?id=CVE-2022-39312
Dataease is an open source data visualization analysis tool. Dataease prior to 1.15.2 has a deserialization vulnerability. In Dataease, the Mysql data source in the data source function can customize the JDBC connection parameters and the Mysql server target to be connected. In `backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java`, the `MysqlConfiguration` class does not filter any parameters. If an attacker adds some parameters to a JDBC url and connects to a malicious mysql server, the attacker can trigger the mysql jdbc deserialization vulnerability. • https://github.com/dataease/dataease/commit/956ee2d6c9e81349a60aef435efc046888e10a6d https://github.com/dataease/dataease/pull/3328 https://github.com/dataease/dataease/releases/tag/v1.15.2 https://github.com/dataease/dataease/security/advisories/GHSA-q4qq-jhjv-7rh2 • CWE-20: Improper Input Validation CWE-502: Deserialization of Untrusted Data •
CVE-2022-23331
https://notcve.org/view.php?id=CVE-2022-23331
In DataEase v1.6.1, an authenticated user can gain unauthorized access to all user information and can change the administrator password. En DataEase versión v1.6.1, un usuario autenticado puede conseguir acceso no autorizado a toda la información del usuario y puede cambiar la contraseña del administrador • https://github.com/dataease/dataease/issues/1618 •