Lucene search

K
prionPRIOn knowledge basePRION:CVE-2022-39312
HistoryOct 25, 2022 - 5:15 p.m.

Deserialization of untrusted data

2022-10-2517:15:00
PRIOn knowledge base
www.prio-n.com
2
dataease
deserialization
mysql
vulnerability
jdbc
connection
parameters
malicious server
patch

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

51.1%

Dataease is an open source data visualization analysis tool. Dataease prior to 1.15.2 has a deserialization vulnerability. In Dataease, the Mysql data source in the data source function can customize the JDBC connection parameters and the Mysql server target to be connected. In backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java, the MysqlConfiguration class does not filter any parameters. If an attacker adds some parameters to a JDBC url and connects to a malicious mysql server, the attacker can trigger the mysql jdbc deserialization vulnerability. Through the deserialization vulnerability, the attacker can execute system commands and obtain server privileges. Version 1.15.2 contains a patch for this issue.

CPENameOperatorVersion
dataeaselt1.15.2

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

51.1%

Related for PRION:CVE-2022-39312