CVE-2025-53004
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-30

Last updated on: 2025-07-10

Assigner: GitHub, Inc.

Description
DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.11, there is a bypass vulnerability in Dataease's Redshift Data Source JDBC Connection Parameters. The sslfactory and sslfactoryarg parameters could trigger a bypass vulnerability. This issue has been patched in version 2.10.11.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-30
Last Modified
2025-07-10
Generated
2026-05-07
AI Q&A
2025-06-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dataease dataease to 2.10.11 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-153 The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as substitution characters when they are sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-53004 is a remote code execution vulnerability in Dataease related to the handling of JDBC connection strings for Redshift Data Source. The vulnerability arises because the validation logic for illegal parameters in the JDBC URL can be bypassed by inserting backslash characters. Specifically, the sslfactory and sslfactoryarg parameters could be exploited by an attacker injecting a malicious URL into the Hostname/IP Address field, allowing access to malicious XML files during schema fetching. This bypass allows attackers to execute unauthorized code or access resources. The issue was fixed by improving the validation to remove backslashes before checking for illegal parameters. [1, 2]


How can this vulnerability impact me? :

This vulnerability can allow an attacker to perform remote code execution on the affected Dataease system by injecting malicious parameters into the JDBC connection string. This could lead to unauthorized access to resources, execution of arbitrary code, and potentially compromise the integrity and confidentiality of your data and systems. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring JDBC connection strings for the presence of the illegal parameters `sslfactory` and `sslfactoryarg` in the Redshift Data Source connection URLs, especially if these parameters include suspicious or external URLs. You can search logs or network traffic for JDBC URLs containing these parameters. For example, using command-line tools, you might run commands like `grep -i 'sslfactory' /path/to/logs` or use network monitoring tools to filter for suspicious JDBC connection strings containing `sslfactory` or `sslfactoryarg`. Additionally, look for connection strings that include backslash characters attempting to bypass validation. [2, 1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Dataease to version 2.10.11 or later, where the vulnerability has been patched. This update fixes the validation logic to properly detect and block illegal parameters in the JDBC URL, preventing bypass via backslash characters. Until the upgrade can be applied, restrict or monitor the use of the `sslfactory` and `sslfactoryarg` parameters in JDBC connection strings and avoid accepting untrusted input in the Hostname/IP Address field to prevent injection of malicious URLs. [2, 1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart