Skip to content

Apache DolphinScheduler vulnerable to arbitrary JavaScript execution as root for authenticated users

Critical severity GitHub Reviewed Published Feb 23, 2024 to the GitHub Advisory Database • Updated May 20, 2024

Package

maven org.apache.dolphinscheduler:dolphinscheduler-master (Maven)

Affected versions

< 3.2.1

Patched versions

3.2.1

Description

Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed JavaScript to be executed on the server.

This issue is a legacy of CVE-2023-49299. We didn't fix it completely in CVE-2023-49299, and we added one more patch to fix it.

This issue affects Apache DolphinScheduler: until 3.2.1.

Users are recommended to upgrade to version 3.2.1, which fixes the issue.

References

Published by the National Vulnerability Database Feb 23, 2024
Published to the GitHub Advisory Database Feb 23, 2024
Reviewed Feb 23, 2024
Last updated May 20, 2024

Severity

Critical

Weaknesses

CVE ID

CVE-2024-23320

GHSA ID

GHSA-rc6h-qwj9-2c53

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.