First published: Thu Nov 07 2024(Updated: )
DataEase is an open source data visualization analysis tool that helps users quickly analyze data and gain insights into business trends. In affected versions a the lack of signature verification of jwt tokens allows attackers to forge jwts which then allow access to any interface. The vulnerability has been fixed in v2.10.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dataease | <2.10.2 | |
Dataease | <2.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47073 has a high severity due to the risk of unauthorized access through forged JWT tokens.
To fix CVE-2024-47073, you should upgrade DataEase to version 2.10.2 or later, which includes proper JWT signature verification.
CVE-2024-47073 affects all versions of DataEase prior to 2.10.2.
CVE-2024-47073 is classified as a JWT signature verification vulnerability.
Attackers can exploit CVE-2024-47073 to forge JWT tokens, allowing them to gain unauthorized access to system interfaces.