DataEase is an open source business intelligence and data visualization tool. A bypass of CVE-2025-46566's patch exists in versions prior to 2.10.10. In a malicious payload, `getUrlType()` retrieves `hostName`. Since the judgment statement returns false, it will not enter the if statement and will not be filtered. The payload can be directly concatenated at the replace location to construct a malicious JDBC statement. Version 2.10.10 contains a patch for the issue.
References
Link | Resource |
---|---|
https://github.com/dataease/dataease/commit/03b18db8a0fb7e9dc2c44f6d26d8c6221b7748c4 | Patch |
https://github.com/dataease/dataease/security/advisories/GHSA-6pq2-6q8x-mp2r | Exploit Third Party Advisory |
https://github.com/dataease/dataease/security/advisories/GHSA-6pq2-6q8x-mp2r | Exploit Third Party Advisory |
Configurations
History
05 Jun 2025, 14:07
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
Dataease
Dataease dataease |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:* | |
References | () https://github.com/dataease/dataease/commit/03b18db8a0fb7e9dc2c44f6d26d8c6221b7748c4 - Patch | |
References | () https://github.com/dataease/dataease/security/advisories/GHSA-6pq2-6q8x-mp2r - Exploit, Third Party Advisory |
04 Jun 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dataease/dataease/security/advisories/GHSA-6pq2-6q8x-mp2r - | |
Summary |
|
03 Jun 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-03 21:15
Updated : 2025-06-05 14:07
NVD link : CVE-2025-48999
Mitre link : CVE-2025-48999
CVE.ORG link : CVE-2025-48999
JSON object : View
Products Affected
dataease
- dataease
CWE
CWE-284
Improper Access Control
CWE-923Improper Restriction of Communication Channel to Intended Endpoints
NVD-CWE-noinfo