Metrics
Affected Vendors & Products
Fri, 19 Sep 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Wed, 17 Sep 2025 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dataease
Dataease dataease |
|
Vendors & Products |
Dataease
Dataease dataease |
Mon, 15 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 15 Sep 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Dataease is an open source data analytics and visualization platform. In Dataease versions up to 2.10.12, the patch introduced to mitigate DB2 JDBC deserialization remote code execution attacks only blacklisted the rmi parameter. The ldap parameter in the DB2 JDBC connection string was not filtered, allowing attackers to exploit the DB2 JDBC connection string to trigger server-side request forgery (SSRF). In higher versions of Java, ldap deserialization (autoDeserialize) is disabled by default, preventing remote code execution, but SSRF remains exploitable. Versions up to 2.10.12 are affected. The issue is fixed in version 2.10.13. Updating to 2.10.13 or later is recommended. No known workarounds are documented aside from upgrading. | |
Title | Dataease server-side request forgery via unfiltered DB2 JDBC ldap parameter | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-15T16:37:09.814Z
Reserved: 2025-08-22T14:30:32.220Z
Link: CVE-2025-58045

Updated: 2025-09-15T16:36:58.758Z

Status : Analyzed
Published: 2025-09-15T16:15:39.590
Modified: 2025-09-19T19:34:04.427
Link: CVE-2025-58045

No data.

Updated: 2025-09-17T10:06:59Z