Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dataease jdbc 反序列化漏洞 #395

Open
y1ong opened this issue Mar 1, 2024 · 0 comments
Open

Dataease jdbc 反序列化漏洞 #395

y1ong opened this issue Mar 1, 2024 · 0 comments
Labels

Comments

@y1ong
Copy link
Owner

y1ong commented Mar 1, 2024

  • 漏洞编号: CVE-2024-23328
  • 危害定级: 严重
  • 漏洞标签: 发布预警 公开漏洞
  • 披露日期: 2024-02-29
  • 信息来源: https://www.oscs1024.com/cm
  • 推送原因: 漏洞创建

漏洞描述

Dataease是一款开源的数据可视化分析工具。
受影响版本中,由于未对用户输入的数据库连接参数做有效过滤,具有 Dataease 登陆权限的攻击者可通过使用URL编码 jdbc url 中的 autoDeserialize、allowUrlInLocalInfile参数绕过 jdbcUrl 检测,进而读取 MySQL 客户端任意文件或反序列化恶意代码。

参考链接

  1. https://www.oscs1024.com/hd/MPS-j54s-zgbo
  2. https://nvd.nist.gov/vuln/detail/CVE-2024-23328
  3. dataease/dataease@4128adf
  4. dataease/dataease@bb540e6
  5. GHSA-8x8q-p622-jf25
@y1ong y1ong added the vuln label Mar 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant