---

Hello everyone,

Today we are going to talk about a stored cross-site scripting (XSS) vulnerability (CVE-2023-37257) in the popular open-source data visualization analysis tool called DataEase. Before we get started on the nitty-gritty details, let's first understand what DataEase is and why it's important.

DataEase is an open-source platform that allows users to analyze, visualize, and work with data in a more accessible and user-friendly way. It provides various features such as import/export, data manipulation, and easy visualization options. Due to its versatility, it has widespread usage and it is critical to maintain and ensure the security of the platform.

Unfortunately, before version 1.18.9, DataEase had a stored cross-site scripting vulnerability that affected its panel and dataset. The good news, however, is that this vulnerability has been fixed in v1.18.9. If you are using an older version, we strongly recommend updating to the latest version to safeguard the security of your data.

Now let's dive deeper into the details of this vulnerability.

Vulnerability Details

As mentioned above, the vulnerability that we are discussing is a stored cross-site scripting (XSS) vulnerability in DataEase's panel and dataset. This vulnerability allows an attacker to inject malicious JavaScript code into the panel and dataset which could then be executed when a user interacts with the affected panel or dataset.

This type of vulnerability can lead to serious security risks like stealing users' credentials, redirecting users to phishing websites, or even executing arbitrary code on the user's machine.

Here's an example of how an attacker can exploit this vulnerability

1. Attacker creates a new dataset in DataEase and adds a malicious JavaScript payload in either the panel or dataset description, such as:

`

`

2. The unsuspecting user interacts with the malicious panel or dataset (e.g., by opening it in DataEase or embedding it into a webpage).

3. As the user interacts with the malicious panel or dataset, the attacker's malicious JavaScript code is executed, potentially leading to the above-mentioned security risks.

Solution and Workarounds

The vulnerability has been fixed in DataEase v1.18.9. There are no known workarounds other than updating the software to the latest version. You can download the latest version of DataEase from the official website.

References

For more information on this vulnerability, please refer to the following original references and links:

- CVE-2023-37257 details
- DataEase Release Notes
- DataEase Official Website


In conclusion, it is crucial to keep your software, especially open-source platforms like DataEase, up-to-date. The stored cross-site scripting vulnerability (CVE-2023-37257) discussed in this post has been fixed in version 1.18.9, and we strongly recommend updating to this version to ensure the security of your data and the platform itself. Stay safe and secure!

Timeline

Published on: 07/25/2023 20:15:00 UTC
Last modified on: 08/01/2023 20:18:00 UTC