Skip to content

The DataEase dashboard has a stored XSS vulnerability

High
fit2cloudrd published GHSA-xj3h-3wmw-j5vf Feb 28, 2023

Package

maven io.dataease (Maven)

Affected versions

<= 1.18.2

Patched versions

1.18.3

Description

Impact

When saving a dashboard on the DataEase platform, the effect of permanently storing malicious code is achieved by modifying the saved data.

For example, modify the propValue field in the saved data so that it pops up a dialog with XSS content, "propValue:123<audio src=x onerror=confirm('XSS')>".

image

Trigger the payload:
image

The vulnerability can lead to the execution of malicious code stored by the attacker on the server side when the user then accesses the DataEase dashboard and causes damage.

Affected versions: <= 1.18.2

Patches

The vulnerability has been fixed in v1.18.3.

Workarounds

It is recommended to upgrade the version to v1.18.3.

References

If you have any questions or comments about this advisory:

Open an issue in https://github.com/dataease/dataease
Email us at wei@fit2cloud.com

Severity

High

CVE ID

CVE-2023-25807

Weaknesses

No CWEs

Credits