Deserialization vulnerability in DataEase datasource can lead to arbitrary code execution
CVE-2024-23328
What is CVE-2024-23328?
DataEase, an open-source data visualization analysis tool, has encountered a deserialization vulnerability that poses risks of arbitrary code execution. The vulnerability originates from the MySQL datasource component, precisely located in core/core-backend/src/main/java/io/dataease/datasource/type/Mysql.java. This flaw permits attackers to bypass the existing blacklist of MySQL JDBC attacks, enabling them to exploit the system for deserialization execution or unauthorized access to arbitrary files. The issue has been addressed and patched in DataEase versions 1.18.15 and 2.3.0. It is crucial for users of affected versions to update promptly to mitigate potential risks associated with this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
dataease < 1.18.15 < 1.18.15
dataease >= 2.0.0, < 2.3.0 < 2.0.0, 2.3.0
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
