DataEase, an open source data visualization and analysis tool, has a database configuration information exposure vulnerability prior to version 2.5.0. Visiting the `/de2api/engine/getEngine;.js` path via a browser reveals that the platform's database configuration is returned. The vulnerability has been fixed in v2.5.0. No known workarounds are available aside from upgrading.
No PoCs from references.
- https://github.com/12442RF/POC
- https://github.com/20142995/nuclei-templates
- https://github.com/DMW11525708/wiki
- https://github.com/Lern0n/Lernon-POC
- https://github.com/Linxloop/fork_POC
- https://github.com/adysec/POC
- https://github.com/cisp-pte/POC-20241008-sec-fork
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/eeeeeeeeee-code/POC
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/greenberglinken/2023hvv_1
- https://github.com/iemotion/POC
- https://github.com/laoa1573/wy876
- https://github.com/oLy0/Vulnerability
- https://github.com/plbplbp/loudong001
- https://github.com/tanjiti/sec_profile
- https://github.com/wy876/POC
- https://github.com/wy876/wiki