CVE-2023-40183
Summary
| CVE | CVE-2023-40183 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-09-21 15:15:00 UTC |
| Updated | 2023-09-26 14:59:00 UTC |
| Description | DataEase is an open source data visualization and analysis tool. Prior to version 1.18.11, DataEase has a vulnerability that allows an attacker to to obtain user cookies. The program only uses the `ImageIO.read()` method to determine whether the file is an image file or not. There is no whitelisting restriction on file suffixes. This allows the attacker to synthesize the attack code into an image for uploading and change the file extension to html. The attacker may steal user cookies by accessing links. The vulnerability has been fixed in v1.18.11. There are no known workarounds. |
Risk And Classification
Problem Types: CWE-434
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| fix: 加强图片校验,防止恶意代码通过合成到图片上传到服务器中引起的攻击行为 · dataease/dataease@8265130 · GitHub | MISC | github.com | |
| DataEase has a vulnerability to obtain user cookies · Advisory · dataease/dataease · GitHub | MISC | github.com | |
| Release v1.18.11 · dataease/dataease · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.