DataEase, an open source data visualization and analysis tool, has a database configuration information exposure vulnerability prior to version 2.5.0. Visiting the `/de2api/engine/getEngine;.js` path via a browser reveals that the platform's database configuration is returned. The vulnerability has been fixed in v2.5.0. No known workarounds are available aside from upgrading.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5 | vendor advisory |
https://github.com/dataease/dataease/releases/tag/v2.5.0 | release notes |