Exploit
CVE-2024-46997

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CWE-74)

Published: Sep 23, 2024 / Updated: 57d ago

010
CVSS 9.8EPSS 0.04%Critical
CVE info copied to clipboard

Summary

DataEase, an open source data visualization analysis tool, contains a vulnerability in versions prior to 2.10.1 that allows an attacker to achieve remote command execution by adding a carefully constructed h2 data source connection string. An attacker can exploit this vulnerability by sending a specially crafted POST request to the /de2api/datasource/validate endpoint with a malicious h2 data source connection string in the configuration parameter. This allows the execution of arbitrary SQL commands, including the creation of Java functions that can execute system commands.

Impact

The impact of this vulnerability is severe. Successful exploitation allows an attacker to execute arbitrary commands remotely on the affected system. This could lead to complete compromise of the system's confidentiality, integrity, and availability. Potential consequences include: 1. Unauthorized access to sensitive data 2. Modification of system configurations 3. Disruption of services running on the affected system 4. Installation of malware or backdoors 5. Use of the compromised system as a launching point for further attacks Given the ability to execute arbitrary commands, an attacker could potentially gain full control over the affected DataEase instance and possibly the underlying server.

Exploitation

One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability has been fixed in DataEase version 2.10.1. It is strongly recommended to upgrade to this version or later immediately to mitigate the risk.

Mitigation

1. Upgrade DataEase to version 2.10.1 or later immediately. 2. If immediate upgrading is not possible, implement the following temporary measures: - Restrict network access to the DataEase application, allowing only trusted IP addresses. - Monitor for suspicious activities or unauthorized access attempts, particularly those involving h2 data source connection strings. - Implement strong input validation and sanitization for all user inputs, especially those related to data source connections. - Apply the principle of least privilege to minimize the potential impact if the system is compromised. 3. Conduct a thorough security audit of the system to ensure no compromise has occurred. 4. Review and update security policies and procedures related to application security and patch management.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

Vendor Advisory

GitHub Advisories released a security advisory.

Sep 23, 2024 at 10:26 AM
First Article

Feedly found the first article mentioning CVE-2024-46997. See article

Sep 23, 2024 at 3:47 PM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 23, 2024 at 3:47 PM
CVE Assignment

NVD published the first details for CVE-2024-46997

Sep 23, 2024 at 4:15 PM
CVSS

A CVSS base score of 9.8 has been assigned.

Sep 23, 2024 at 4:21 PM / nvd
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.6%)

Sep 24, 2024 at 9:33 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Sep 26, 2024 at 1:36 PM / nvd
Threat Intelligence Report

CVE-2024-46997 is a critical vulnerability in DataEase prior to version 2.10.1, with a CVSS score of 9.8, allowing remote command execution via a specially crafted h2 data source connection string. The provided information does not specify whether the vulnerability is being exploited in the wild, nor does it mention any proof-of-concept exploits, mitigations, detections, or patches. Additionally, there is no indication of downstream impacts on other third-party vendors or technologies. See article

Sep 27, 2024 at 5:36 AM
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Oct 7, 2024 at 7:11 PM
Static CVE Timeline Graph

Affected Systems

Dataease/dataease
+null more

Exploits

https://github.com/dataease/dataease/security/advisories/GHSA-h7mj-m72h-qm8w
+null more

Patches

Github Advisory
+null more

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-10: Buffer Overflow via Environment Variables
+null more

Vendor Advisory

[GHSA-h7mj-m72h-qm8w] DataEase's H2 datasource has a remote command execution risk
Package: io.dataease:common Content-Type: application/json

References

@RISK: The Consensus Security Vulnerability Alert: Vol. 24, Num. 38 - SANS Institute
Product: Apache HugeGraph-Server CVSS Score: 0 ** KEV since 2024-09-18 ** NVD: ISC Podcast: CVE-2024-7120 - Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90 are vulnerable to critical os command injection via manipulation of the argument template in the Web Interface component's list_base_config.php file, allowing for remote attacks with publicly disclosed exploit potential (VDB-272451). Product: Ivanti Endpoint Manager Cloud Services Appliance CVSS Score: 9.1 ** KEV since 2024-09-19 ** NVD: ISC Podcast: NVD References: CVE-2024-9043 - Cellopoint's Secure Email Gateway is vulnerable to buffer overflow in authentication allowing remote attackers to crash the process and gain admin privileges.

News

Vulnerability Summary for the Week of September 23, 2024
High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source Info Patch Info Dover Fueling Solutions (DFS)–ProGauge MAGLINK LX CONSOLE A specially crafted POST request to the ProGauge MAGLINK LX CONSOLE UTILITY sub-menu can allow a remote attacker to inject arbitrary commands. 2024-09-25 10 CVE-2024-43693 ics-cert@hq.dhs.gov Dover Fueling Solutions (DFS)–ProGauge MAGLINK LX CONSOLE A specially crafted POST request to the ProGauge MAGLINK LX CONSOLE IP sub-menu can allow a remote attacker to inject arbitrary commands. 2024-09-25 10 CVE-2024-45066 ics-cert@hq.dhs.gov webdevmattcrom–GiveWP Donation Plugin and Fundraising Platform The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.1 via deserialization of untrusted input via several parameters like ‘give_title’ and ‘card_address’. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files and achieve remote code execution. This is essentially the same vulnerability as CVE-2024-5932, however, it was discovered the the presence of stripslashes_deep on user_info allows the is_serialized check to be bypassed. This issue was mostly patched in 3.16.1, but further hardening was added in 3.16.2. 2024-09-28 10 CVE-2024-8353 security@wordfence.com security@wordfence.com security@wordfence.com security@wordfence.com security@wordfence.com security@wordfence.com Scriptcase–Scriptcase Vulnerability in the Scriptcase application version 9.4.019, which involves the arbitrary upload of a file via /scriptcase/devel/lib/third/jquery_plugin/jQuery-File-Upload/server/php/ via a POST request. An attacker could upload malicious files to the server due to the application not properly verifying user input. 2024-09-25 10 CVE-2024-8940 cve-coordination@incibe.es n/a–n/a File Upload vulnerability in CS-Cart MultiVendor 4.16.1 allows remote attackers to run arbitrary code via the image upload feature when customizing a shop.
Update Mon Oct 14 22:39:35 UTC 2024
Update Mon Oct 14 22:39:35 UTC 2024
CVE-2024-46997 Exploit
CVE Id : CVE-2024-46997 Published Date: 2024-10-07T17:20:00+00:00 DataEase is an open source data visualization analysis tool. Prior to version 2.10.1, an attacker can achieve remote command execution by adding a carefully constructed h2 data source connection string. The vulnerability has been fixed in v2.10.1. inTheWild added a link to an exploit: https://github.com/dataease/dataease/security/advisories/GHSA-h7mj-m72h-qm8w
cveNotify : 🚨 CVE-2024-46997DataEase is an open source data visualization analysis tool. Prior to version 2.10.1, an attacker can achieve remote command execution by adding a carefully constructed h2 data source connection string. The vulnerability has been fixed in v2.10.1.🎖@cveNotify
cveNotify : 🚨 CVE-2024-46997DataEase is an open source data visualization analysis tool. Prior to version 2.10.1, an attacker can achieve remote command execution by adding a carefully constructed h2 data source connection string. The vulnerability has been fixed in v2.10.1.🎖@cveNotify
Vulnerability Summary for the Week of September 23, 2024
High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source Info Patch Info Dover Fueling Solutions (DFS)--ProGauge MAGLINK LX CONSOLE A specially crafted POST request to the ProGauge MAGLINK LX CONSOLE UTILITY sub-menu can allow a remote attacker to inject arbitrary commands. 2024-09-25 10 CVE-2024-43693 ics-cert@hq.dhs.gov Dover Fueling Solutions (DFS)--ProGauge MAGLINK LX CONSOLE A specially crafted POST request to the ProGauge MAGLINK LX CONSOLE IP sub-menu can allow a remote attacker to inject arbitrary commands. 2024-09-25 10 CVE-2024-45066 ics-cert@hq.dhs.gov webdevmattcrom--GiveWP Donation Plugin and Fundraising Platform The GiveWP - Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.1 via deserialization of untrusted input via several parameters like 'give_title' and 'card_address'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files and achieve remote code execution. This is essentially the same vulnerability as CVE-2024-5932, however, it was discovered the the presence of stripslashes_deep on user_info allows the is_serialized check to be bypassed. This issue was mostly patched in 3.16.1, but further hardening was added in 3.16.2. 2024-09-28 10 CVE-2024-8353 security@wordfence.com security@wordfence.com security@wordfence.com security@wordfence.com security@wordfence.com security@wordfence.com Scriptcase--Scriptcase Vulnerability in the Scriptcase application version 9.4.019, which involves the arbitrary upload of a file via /scriptcase/devel/lib/third/jquery_plugin/jQuery-File-Upload/server/php/ via a POST request. An attacker could upload malicious files to the server due to the application not properly verifying user input. 2024-09-25 10 CVE-2024-8940 cve-coordination@incibe.es n/a--n/a File Upload vulnerability in CS-Cart MultiVendor 4.16.1 allows remote attackers to run arbitrary code via the image upload feature when customizing a shop.
See 12 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI