漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
DataEase has an Arbitrary File Read Vulnerability
Vulnerability Description
DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a JDBC parameter blocklist bypass vulnerability in the MySQL datasource configuration. The Mysql class uses Lombok's @Data annotation, which auto-generates a public setter for the illegalParameters field that contains the JDBC security blocklist. When a datasource configuration is submitted as JSON, Jackson deserialization calls setIllegalParameters with an attacker-supplied empty list, replacing the blocklist before getJdbc() validation runs. This allows an authenticated attacker to include dangerous JDBC parameters such as allowLoadLocalInfile=true, and by pointing the datasource at a rogue MySQL server, exploit the LOAD DATA LOCAL INFILE protocol feature to read arbitrary files from the DataEase server filesystem, including sensitive environment variables and database credentials. This issue has been fixed in version 2.10.21.
CVSS Information
N/A
Vulnerability Type
宽松定义的白名单
Vulnerability Title
DataEase 安全漏洞
Vulnerability Description
DataEase是DataEase开源的一个开源的数据可视化分析工具。用于帮助用户快速分析数据并洞察业务趋势,从而实现业务的改进与优化。 DataEase 2.10.20及之前版本存在安全漏洞,该漏洞源于MySQL数据源配置中的JDBC参数黑名单可被绕过,允许经过身份验证的攻击者包含危险的JDBC参数,并通过指向恶意MySQL服务器利用LOAD DATA LOCAL INFILE协议功能读取DataEase服务器文件系统中的任意文件。
CVSS Information
N/A
Vulnerability Type
N/A