CVE-2022-34115:
Dataease v1.11.1 SQL Injection via parameter dataSourceId
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.29179%
CWE
Published
7/23/2022
Updated
1/30/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
io.dataease:dataease-plugin-common | maven | < 1.11.2 | 1.11.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability combines two CWEs. For CWE-434: The GitHub issue #2428 demonstrates a file write via the 'id' parameter in /driver/file/upload
, confirmed by the release note stating a fix for 'arbitrary file write via driver management'. The parameter is used unsafely in path construction. For CWE-89: The CVE title and GHSA explicitly mention SQLi via dataSourceId
, and the release note fixes 'unauthorized SQL execution' in dataset previews. While the exact SQLi code isn't shown, the dataSourceId
's role in SQL execution and lack of pre-validation in v1.11.1
strongly suggest insecure SQL concatenation. Medium confidence for the SQLi function
due to indirect evidence.