CVE-2024-46985

7.5 HIGH
XXE

📋 TL;DR

DataEase versions before 2.10.1 contain an XML external entity injection (XXE) vulnerability in the static resource upload interface. This allows attackers to read arbitrary files from the server and potentially perform network reconnaissance of internal systems. All DataEase deployments using vulnerable versions are affected.

💻 Affected Systems

Products:
  • DataEase
Versions: All versions prior to 2.10.1
Operating Systems: All platforms running DataEase
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the static resource upload interface which is typically accessible in standard configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through file system access, credential theft from configuration files, and lateral movement within the internal network.

🟠

Likely Case

Unauthorized reading of sensitive files (configuration, credentials, source code) and internal network scanning.

🟢

If Mitigated

Limited impact if proper network segmentation and file permissions are configured, though file reading may still be possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XXE vulnerabilities are well-understood with standard payloads available. The advisory confirms exploitation vectors for file reading and intranet detection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.1

Vendor Advisory: https://github.com/dataease/dataease/security/advisories/GHSA-4m9p-7xg6-f4mm

Restart Required: Yes

Instructions:

1. Backup your DataEase configuration and data. 2. Download DataEase v2.10.1 from the official repository. 3. Stop the DataEase service. 4. Replace the installation with v2.10.1. 5. Restart the DataEase service. 6. Verify the version is now 2.10.1.

🔧 Temporary Workarounds

Disable XXE Processing

all

Configure XML parsers to disable external entity processing

Modify DataEase XML parser configuration to set: FEATURE_SECURE_PROCESSING = true, DISALLOW_DOCTYPE_DECL = true

Restrict Upload Interface Access

linux

Block external access to the static resource upload endpoint using network controls

Add firewall rule: iptables -A INPUT -p tcp --dport [DataEase-port] -m string --string "static/upload" --algo bm -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate DataEase from sensitive internal systems
  • Deploy a web application firewall (WAF) with XXE protection rules enabled

🔍 How to Verify

Check if Vulnerable:

Check if DataEase version is below 2.10.1 via the web interface or configuration files

Check Version:

Check the DataEase web interface admin panel or examine the application version in configuration files

Verify Fix Applied:

Confirm version is 2.10.1 or higher and test the upload interface with XXE payloads (in a controlled environment)

📡 Detection & Monitoring

Log Indicators:

  • XML parsing errors with external entity references
  • Unusual file access patterns from upload endpoints
  • Large XML payloads in upload requests

Network Indicators:

  • HTTP POST requests to static upload endpoints containing XML entities
  • Outbound connections from DataEase to internal systems following upload requests

SIEM Query:

source="dataease" AND (url="*static/upload*" AND (body="*<!ENTITY*" OR body="*SYSTEM*" OR body="*PUBLIC*"))

🔗 References

📤 Share & Export