Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
DataEase vulnerable to JDBC URL injection in DB2 and MongoDB data source configuration
Vulnerability Description
DataEase is a data visualization and analytics platform. In DataEase versions through 2.10.13, a JDBC URL injection vulnerability exists in the DB2 and MongoDB data source configuration handlers. In the DB2 data source handler, when the extraParams field is empty, the HOSTNAME, PORT, and DATABASE values are directly concatenated into the JDBC URL without filtering illegal parameters. This allows an attacker to inject a malicious JDBC string into the HOSTNAME field to bypass previously patched vulnerabilities CVE-2025-57773 and CVE-2025-58045. The vulnerability is fixed in version 2.10.14. No known workarounds exist.
CVSS Information
N/A
Vulnerability Type
可信数据的反序列化
Vulnerability Title
DataEase 代码问题漏洞
Vulnerability Description
DataEase是DataEase开源的一个开源的数据可视化分析工具。用于帮助用户快速分析数据并洞察业务趋势,从而实现业务的改进与优化。 DataEase 2.10.13及之前版本存在代码问题漏洞,该漏洞源于DB2数据源处理程序中HOSTNAME、PORT和DATABASE值直接拼接成JDBC URL而未过滤非法参数,可能导致JDBC URL注入攻击。
CVSS Information
N/A
Vulnerability Type
N/A