Vulnerability Details : CVE-2023-40183
Potential exploit
DataEase is an open source data visualization and analysis tool. Prior to version 1.18.11, DataEase has a vulnerability that allows an attacker to to obtain user cookies. The program only uses the `ImageIO.read()` method to determine whether the file is an image file or not. There is no whitelisting restriction on file suffixes. This allows the attacker to synthesize the attack code into an image for uploading and change the file extension to html. The attacker may steal user cookies by accessing links. The vulnerability has been fixed in v1.18.11. There are no known workarounds.
Products affected by CVE-2023-40183
- cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-40183
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-40183
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2023-40183
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-40183
-
https://github.com/dataease/dataease/commit/826513053146721a2b3e09a9c9d3ea41f8f10569
fix: 加强图片校验,防止恶意代码通过合成到图片上传到服务器中引起的攻击行为 · dataease/dataease@8265130 · GitHubPatch
-
https://github.com/dataease/dataease/security/advisories/GHSA-w2r4-2r4w-fjxv
DataEase has a vulnerability to obtain user cookies · Advisory · dataease/dataease · GitHubExploit
-
https://github.com/dataease/dataease/releases/tag/v1.18.11
Release v1.18.11 · dataease/dataease · GitHubRelease Notes
Jump to