{"api_version":"1","generated_at":"2026-04-23T09:53:14+00:00","cve":"CVE-2023-40183","urls":{"html":"https://cve.report/CVE-2023-40183","api":"https://cve.report/api/cve/CVE-2023-40183.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-40183","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-40183"},"summary":{"title":"CVE-2023-40183","description":"DataEase is an open source data visualization and analysis tool. Prior to version 1.18.11, DataEase has a vulnerability that allows an attacker to to obtain user cookies. The program only uses the `ImageIO.read()` method to determine whether the file is an image file or not. There is no whitelisting restriction on file suffixes. This allows the attacker to synthesize the attack code into an image for uploading and change the file extension to html. The attacker may steal user cookies by accessing links. The vulnerability has been fixed in v1.18.11. There are no known workarounds.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-09-21 15:15:00","updated_at":"2023-09-26 14:59:00"},"problem_types":["CWE-434"],"metrics":[],"references":[{"url":"https://github.com/dataease/dataease/commit/826513053146721a2b3e09a9c9d3ea41f8f10569","name":"https://github.com/dataease/dataease/commit/826513053146721a2b3e09a9c9d3ea41f8f10569","refsource":"MISC","tags":[],"title":"fix: 加强图片校验，防止恶意代码通过合成到图片上传到服务器中引起的攻击行为 · dataease/dataease@8265130 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/dataease/dataease/security/advisories/GHSA-w2r4-2r4w-fjxv","name":"https://github.com/dataease/dataease/security/advisories/GHSA-w2r4-2r4w-fjxv","refsource":"MISC","tags":[],"title":"DataEase has a vulnerability to obtain user cookies · Advisory · dataease/dataease · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/dataease/dataease/releases/tag/v1.18.11","name":"https://github.com/dataease/dataease/releases/tag/v1.18.11","refsource":"MISC","tags":[],"title":"Release v1.18.11 · dataease/dataease · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-40183","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40183","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"40183","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dataease","cpe5":"dataease","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-40183","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"DataEase is an open source data visualization and analysis tool. Prior to version 1.18.11, DataEase has a vulnerability that allows an attacker to to obtain user cookies. The program only uses the `ImageIO.read()` method to determine whether the file is an image file or not. There is no whitelisting restriction on file suffixes. This allows the attacker to synthesize the attack code into an image for uploading and change the file extension to html. The attacker may steal user cookies by accessing links. The vulnerability has been fixed in v1.18.11. There are no known workarounds."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-434: Unrestricted Upload of File with Dangerous Type","cweId":"CWE-434"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"dataease","product":{"product_data":[{"product_name":"dataease","version":{"version_data":[{"version_affected":"=","version_value":"< 1.18.11"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/dataease/dataease/security/advisories/GHSA-w2r4-2r4w-fjxv","refsource":"MISC","name":"https://github.com/dataease/dataease/security/advisories/GHSA-w2r4-2r4w-fjxv"},{"url":"https://github.com/dataease/dataease/commit/826513053146721a2b3e09a9c9d3ea41f8f10569","refsource":"MISC","name":"https://github.com/dataease/dataease/commit/826513053146721a2b3e09a9c9d3ea41f8f10569"},{"url":"https://github.com/dataease/dataease/releases/tag/v1.18.11","refsource":"MISC","name":"https://github.com/dataease/dataease/releases/tag/v1.18.11"}]},"source":{"advisory":"GHSA-w2r4-2r4w-fjxv","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-09-21 15:15:00","lastModifiedDate":"2023-09-26 14:59:00","problem_types":["CWE-434"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*","versionEndExcluding":"1.18.11","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}