Vulnerabilities > CVE-2023-32310 - Authorization Bypass Through User-Controlled Key vulnerability in Dataease
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
NONE Integrity impact
HIGH Availability impact
HIGH Summary
DataEase is an open source data visualization and analysis tool. The API interface for DataEase delete dashboard and delete system messages is vulnerable to insecure direct object references (IDOR). This could result in a user deleting another user's dashboard or messages or interfering with the interface for marking messages read. The vulnerability has been fixed in v1.18.7. There are no known workarounds aside from upgrading.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/dataease/dataease/commit/72f428e87b5395c03d2f94ef6185fc247ddbc8dc
- https://github.com/dataease/dataease/pull/5342
- https://github.com/dataease/dataease/releases/tag/v1.18.7
- https://github.com/dataease/dataease/security/advisories/GHSA-7hv6-gv38-78wj
- https://github.com/dataease/dataease/commit/72f428e87b5395c03d2f94ef6185fc247ddbc8dc
- https://github.com/dataease/dataease/security/advisories/GHSA-7hv6-gv38-78wj
- https://github.com/dataease/dataease/releases/tag/v1.18.7
- https://github.com/dataease/dataease/pull/5342