CVE-2023-28637

DataEase is an open source data visualization analysis tool. In Dataease users are normally allowed to modify data and the data sources are expected to properly sanitize data. The AWS redshift data source does not provide data sanitization which may lead to remote code execution. This vulnerability has been fixed in v1.18.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*

History

04 Apr 2023, 23:26

Type Values Removed Values Added
References (MISC) https://github.com/dataease/dataease/security/advisories/GHSA-8wg2-9gwc-5fx2 - (MISC) https://github.com/dataease/dataease/security/advisories/GHSA-8wg2-9gwc-5fx2 - Exploit, Vendor Advisory
First Time Dataease dataease
Dataease
CPE cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

28 Mar 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-28 21:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-28637

Mitre link : CVE-2023-28637

CVE.ORG link : CVE-2023-28637


JSON object : View

Products Affected

dataease

  • dataease
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')