CVE-2024-23328

9.1 CRITICAL

📋 TL;DR

This CVE describes a deserialization vulnerability in Dataease's MySQL datasource component that allows attackers to bypass JDBC attack blacklists. Successful exploitation enables arbitrary code execution or arbitrary file reading on affected systems. All Dataease users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Dataease
Versions: All versions before 1.18.15 and 2.3.0
Operating Systems: All operating systems running Dataease
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the MySQL datasource component; systems using other datasource types may still be vulnerable if MySQL is configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Arbitrary code execution with application user privileges, potentially leading to data exfiltration, credential theft, or installation of backdoors.

🟢

If Mitigated

Limited impact due to network segmentation, minimal privileges, and proper input validation preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of Java deserialization attacks and JDBC connection string manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.18.15 or 2.3.0

Vendor Advisory: https://github.com/dataease/dataease/security/advisories/GHSA-8x8q-p622-jf25

Restart Required: Yes

Instructions:

1. Backup your Dataease configuration and data. 2. Stop the Dataease service. 3. Upgrade to version 1.18.15 (for v1.x) or 2.3.0 (for v2.x). 4. Restart the Dataease service. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Dataease MySQL datasource connections to trusted sources only.

Input Validation

all

Implement strict validation of MySQL connection strings and datasource configurations.

🧯 If You Can't Patch

  • Implement network controls to restrict access to Dataease MySQL datasource endpoints
  • Disable or remove MySQL datasource configurations if not required

🔍 How to Verify

Check if Vulnerable:

Check Dataease version via web interface or configuration files; versions below 1.18.15 or 2.3.0 are vulnerable.

Check Version:

Check Dataease web interface admin panel or examine application configuration files for version information.

Verify Fix Applied:

Verify version is 1.18.15 or higher (for v1.x) or 2.3.0 or higher (for v2.x) after upgrade.

📡 Detection & Monitoring

Log Indicators:

  • Unusual MySQL connection strings in datasource logs
  • Java deserialization errors in application logs
  • Unexpected outbound connections from Dataease server

Network Indicators:

  • Suspicious MySQL connection attempts to Dataease
  • Unusual network traffic patterns from Dataease server

SIEM Query:

source="dataease" AND (event="deserialization_error" OR mysql_connection="*allowLoadLocalInfile*" OR mysql_connection="*autoDeserialize*")

🔗 References

📤 Share & Export