CVE-2024-52295

9.8 CRITICAL

📋 TL;DR

CVE-2024-52295 is a critical authentication bypass vulnerability in DataEase where attackers can forge JWT tokens due to hardcoded secrets and identifiers. This allows complete service takeover of affected DataEase instances. All DataEase deployments prior to version 2.10.2 are vulnerable.

💻 Affected Systems

Products:
  • DataEase
Versions: All versions prior to 2.10.2
Operating Systems: All platforms running DataEase
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments are vulnerable regardless of configuration due to hardcoded values in the source code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the DataEase instance allowing attackers to access, modify, or delete all data, execute arbitrary code, and pivot to other systems.

🟠

Likely Case

Unauthorized access to sensitive data visualization dashboards and underlying data sources, potentially leading to data theft or manipulation.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access, but internal threats remain.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly exploitable without authentication.
🏢 Internal Only: HIGH - Internal instances are still vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires understanding JWT token structure but is straightforward once the hardcoded values are identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.2

Vendor Advisory: https://github.com/dataease/dataease/security/advisories/GHSA-45v9-gfcv-xcq6

Restart Required: Yes

Instructions:

1. Backup your DataEase instance and data. 2. Stop the DataEase service. 3. Upgrade to version 2.10.2 using your deployment method (Docker, binary, etc.). 4. Restart the service. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to DataEase instances to only trusted IP addresses or internal networks.

Use firewall rules to block external access to DataEase ports (default: 80, 443, 8080)

🧯 If You Can't Patch

  • Immediately isolate vulnerable instances from internet access and untrusted networks
  • Implement strict network monitoring for unusual authentication patterns or JWT token usage

🔍 How to Verify

Check if Vulnerable:

Check DataEase version via web interface or configuration files. Versions below 2.10.2 are vulnerable.

Check Version:

Check DataEase web interface or docker inspect for version information

Verify Fix Applied:

Confirm version is 2.10.2 or higher and test that JWT tokens with old hardcoded values no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful logins with unusual patterns
  • JWT token validation errors or unusual token formats

Network Indicators:

  • Unusual source IPs accessing authentication endpoints
  • Multiple authentication requests in short timeframes

SIEM Query:

source="dataease" AND (event="authentication" OR event="jwt") AND status="success" | stats count by src_ip

🔗 References

📤 Share & Export