Metrics
Affected Vendors & Products
Fri, 03 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dataease
Dataease sqlbot |
|
| Vendors & Products |
Dataease
Dataease sqlbot |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Dataease SQLbot up to 1.6.0. This issue affects the function get_es_data_by_http of the file backend/apps/db/es_engine.py of the component Elasticsearch Handler. This manipulation of the argument address causes server-side request forgery. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.7.0 is capable of addressing this issue. You should upgrade the affected component. The vendor was contacted early about this disclosure. | |
| Title | Dataease SQLbot Elasticsearch es_engine.py get_es_data_by_http server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-04-02T18:15:11.883Z
Updated: 2026-04-03T20:00:17.177Z
Reserved: 2026-04-02T11:02:32.972Z
Link: CVE-2026-5417
Updated: 2026-04-03T20:00:11.953Z
Status : Awaiting Analysis
Published: 2026-04-02T19:21:36.497
Modified: 2026-04-03T16:10:23.730
Link: CVE-2026-5417
No data.