CVE-2025-58045

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-58045
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58045.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-58045
Related
  • GHSA-fmq3-6xhc-r845
Published
2025-09-15T16:15:39Z
Modified
2025-09-17T05:20:42.598618Z
Summary
[none]
Details

Dataease is an open source data analytics and visualization platform. In Dataease versions up to 2.10.12, the patch introduced to mitigate DB2 JDBC deserialization remote code execution attacks only blacklisted the rmi parameter. The ldap parameter in the DB2 JDBC connection string was not filtered, allowing attackers to exploit the DB2 JDBC connection string to trigger server-side request forgery (SSRF). In higher versions of Java, ldap deserialization (autoDeserialize) is disabled by default, preventing remote code execution, but SSRF remains exploitable. Versions up to 2.10.12 are affected. The issue is fixed in version 2.10.13. Updating to 2.10.13 or later is recommended. No known workarounds are documented aside from upgrading.

References

Affected packages

Git / github.com/dataease/dataease

Affected ranges

Type
GIT
Repo
https://github.com/dataease/dataease
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.0.0-rc1
v1.0.0-rc2
v1.11.0
v1.11.1
v1.2.0
v1.3.0
v1.5.0
v1.5.1
v1.5.2
v1.6.0
v1.8.0
v1.9.0

v2.*

v2.2.0
v2.3.0
v2.4.0
v2.6.0
v2.9.0

Database specific

{
    "vanir_signatures": [
        {
            "target": {
                "file": "core/core-backend/src/main/java/io/dataease/datasource/type/Db2.java"
            },
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "161389756125353000674434153196706317222",
                    "128737220689951653333087233037181738239",
                    "111776724188381125777290244819399318029",
                    "74358520845849105054884226821247504998"
                ]
            },
            "signature_type": "Line",
            "signature_version": "v1",
            "deprecated": false,
            "id": "CVE-2025-58045-43d35bc4",
            "source": "https://github.com/dataease/dataease/commit/77078658715bd85af5867afbfd5f1fcc37cf03c8"
        },
        {
            "target": {
                "file": "core/core-backend/src/main/java/io/dataease/datasource/type/Impala.java",
                "function": "getJdbc"
            },
            "digest": {
                "function_hash": "303403586312742785307290073862973305679",
                "length": 859.0
            },
            "signature_type": "Function",
            "signature_version": "v1",
            "deprecated": false,
            "id": "CVE-2025-58045-8becfa4a",
            "source": "https://github.com/dataease/dataease/commit/77078658715bd85af5867afbfd5f1fcc37cf03c8"
        },
        {
            "target": {
                "file": "core/core-backend/src/main/java/io/dataease/datasource/type/Impala.java"
            },
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "101298929573642802071728888223570198032",
                    "211158115149331556494079950685910576042",
                    "20409387090052583888599888847732403555",
                    "301004849425998865488248425925100011677",
                    "34503899530667134339254268785622887946",
                    "39894445676137277681464572674319929455",
                    "272790013953672796150386807231842354032",
                    "230418909263577481290832061458648440449",
                    "98369805955213083406134952637088272950",
                    "205173009853439790330144360987033304936",
                    "97881927660331271661822041524755775516",
                    "67362837996066895491036262167965060049",
                    "203174799191427566620597313802144224224",
                    "157401452773542423055874464583562010990",
                    "258155786343877593729046645300955071343",
                    "241829180084262291835329456455862859607",
                    "300135230790398810844660608332574494927",
                    "130191747495566765357858499324510657492",
                    "129907656123928142421112841592436043742",
                    "203479864070944689050592951702130122479",
                    "336912253834137028676954467408929349823",
                    "188192583787671454361400580999576455694",
                    "255772802642667320584955123374174539061",
                    "197157854710776494115524897094803834866",
                    "119267620208540501041600515986837789320",
                    "67305898528663910404855856363929362337"
                ]
            },
            "signature_type": "Line",
            "signature_version": "v1",
            "deprecated": false,
            "id": "CVE-2025-58045-fba7926e",
            "source": "https://github.com/dataease/dataease/commit/77078658715bd85af5867afbfd5f1fcc37cf03c8"
        }
    ]
}