Home

Description

Dataease is an open source data analytics and visualization platform. In Dataease versions up to 2.10.12, the patch introduced to mitigate DB2 JDBC deserialization remote code execution attacks only blacklisted the rmi parameter. The ldap parameter in the DB2 JDBC connection string was not filtered, allowing attackers to exploit the DB2 JDBC connection string to trigger server-side request forgery (SSRF). In higher versions of Java, ldap deserialization (autoDeserialize) is disabled by default, preventing remote code execution, but SSRF remains exploitable. Versions up to 2.10.12 are affected. The issue is fixed in version 2.10.13. Updating to 2.10.13 or later is recommended. No known workarounds are documented aside from upgrading.

PUBLISHED Reserved 2025-08-22 | Published 2025-09-15 | Updated 2025-09-15 | Assigner GitHub_M




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 2.10.13
affected

References

github.com/...taease/security/advisories/GHSA-fmq3-6xhc-r845

github.com/...ommit/77078658715bd85af5867afbfd5f1fcc37cf03c8

cve.org (CVE-2025-58045)

nvd.nist.gov (CVE-2025-58045)

Download JSON