First published: Wed Nov 13 2024(Updated: )
DataEase is an open source data visualization analysis tool. Prior to 2.10.2, DataEase allows attackers to forge jwt and take over services. The JWT secret is hardcoded in the code, and the UID and OID are hardcoded. The vulnerability has been fixed in v2.10.2.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dataease | <2.10.2 | |
Dataease | <2.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52295 is considered a high severity vulnerability due to its ability to allow attackers to forge JWTs and take over services.
To fix CVE-2024-52295, upgrade DataEase to version 2.10.2 or later where the vulnerability is patched.
Exploiting CVE-2024-52295 could lead to unauthorized access and control over services using DataEase.
CVE-2024-52295 affects all versions of DataEase prior to 2.10.2.
There are no known workarounds for CVE-2024-52295; the recommended action is to upgrade to the fixed version.