{"id":"CVE-2024-30269","summary":"DataEase has database configuration information exposure vulnerability","details":"DataEase, an open source data visualization and analysis tool, has a database configuration information exposure vulnerability prior to version 2.5.0. Visiting the `/de2api/engine/getEngine;.js` path via a browser reveals that the platform's database configuration is returned. The vulnerability has been fixed in v2.5.0. No known workarounds are available aside from upgrading.","aliases":["GHSA-8gvx-4qvj-6vv5"],"modified":"2026-04-16T04:13:02.321794Z","published":"2024-04-08T14:19:56.293Z","database_specific":{"cwe_ids":["CWE-200"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/30xxx/CVE-2024-30269.json"},"references":[{"type":"WEB","url":"https://github.com/dataease/dataease/releases/tag/v2.5.0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/30xxx/CVE-2024-30269.json"},{"type":"ADVISORY","url":"https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-30269"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dataease/dataease","events":[{"introduced":"0"},{"fixed":"1c9caad894a5f6dc64f1ab3bddda8bc55205ba8b"}]}],"versions":["v1.0.0","v2.2.0","v2.3.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-30269.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}