First published: Wed Dec 18 2024(Updated: )
DataEase is an open source business analytics tool. Authenticated users can read and deserialize arbitrary files through the background JDBC connection. When constructing the jdbc connection string, the parameters are not filtered. This vulnerability has been fixed in v1.18.27. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dataease | <1.18.27 | |
Dataease | <1.18.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-55953 is considered high due to the potential for unauthorized access to sensitive data through arbitrary file deserialization.
To fix CVE-2024-55953, update DataEase to version 1.18.27 or later.
Authenticated users of DataEase versions below 1.18.27 are affected by CVE-2024-55953.
CVE-2024-55953 can be exploited through crafted JDBC connection strings that allow deserialization of arbitrary files.
Yes, a patch for CVE-2024-55953 is included in DataEase version 1.18.27 and later.