CVE-2022-34115: Dataease v1.11.1 SQL Injection via parameter dataSourceId
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.29179%
CWE
Published
7/23/2022
Updated
1/30/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| io.dataease:dataease-plugin-common | maven | < 1.11.2 | 1.11.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability combines two CWEs. For CWE-434: The GitHub issue #2428 demonstrates a file write via the 'id' parameter in /driver/file/upload, confirmed by the release note stating a fix for 'arbitrary file write via driver management'. The parameter is used unsafely in path construction. For CWE-89: The CVE title and GHSA explicitly mention SQLi via dataSourceId, and the release note fixes 'unauthorized SQL execution' in dataset previews. While the exact SQLi code isn't shown, the dataSourceId's role in SQL execution and lack of pre-validation in v1.11.1 strongly suggest insecure SQL concatenation. Medium confidence for the SQLi function due to indirect evidence.