CVE-2025-57772

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote code execution in DataEase BI tools through a JDBC URL bypass. Attackers can exploit a flaw in H2 database driver filtering to execute arbitrary code on affected systems. Organizations using DataEase versions before 2.10.12 are vulnerable.

💻 Affected Systems

Products:
  • DataEase
Versions: All versions prior to 2.10.12
Operating Systems: All platforms running DataEase
Default Config Vulnerable: ⚠️ Yes
Notes: Any DataEase installation with H2 database connectivity is vulnerable. The vulnerability is in the core JDBC URL handling logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands, steal sensitive data, deploy ransomware, or pivot to other systems in the network.

🟠

Likely Case

Remote code execution leading to data theft, installation of backdoors, or use of the compromised system for further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place to detect and contain exploitation attempts.

🌐 Internet-Facing: HIGH - DataEase instances exposed to the internet are directly exploitable without authentication.
🏢 Internal Only: HIGH - Even internally accessible instances are vulnerable to authenticated or network-adjacent attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory provides technical details that could be weaponized. The bypass mechanism is described in the commit and advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.12

Vendor Advisory: https://github.com/dataease/dataease/security/advisories/GHSA-v37q-vh67-9rqv

Restart Required: Yes

Instructions:

1. Backup your DataEase configuration and data. 2. Download version 2.10.12 from the official repository. 3. Stop the DataEase service. 4. Replace the installation with the patched version. 5. Restart the DataEase service. 6. Verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to DataEase instances to only trusted IP addresses

iptables -A INPUT -p tcp --dport [DataEase_port] -s [trusted_ip] -j ACCEPT
iptables -A INPUT -p tcp --dport [DataEase_port] -j DROP

Disable H2 Driver

all

Remove or disable H2 database driver if not required for operations

rm /path/to/dataease/lib/h2*.jar
Restart DataEase service after removal

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to DataEase instances
  • Deploy web application firewall (WAF) rules to block malicious JDBC URL patterns

🔍 How to Verify

Check if Vulnerable:

Check DataEase version via web interface or configuration files. Versions below 2.10.12 are vulnerable.

Check Version:

Check DataEase web interface admin panel or examine version.txt in installation directory

Verify Fix Applied:

Verify version is 2.10.12 or higher and test that H2 JDBC URL filtering is functioning properly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JDBC connection attempts
  • H2 driver initialization errors
  • Suspicious database connection patterns

Network Indicators:

  • Unexpected outbound connections from DataEase server
  • JDBC protocol anomalies

SIEM Query:

source="dataease" AND (jdbc OR h2 OR driver) AND (error OR exception OR malicious)

🔗 References

📤 Share & Export