Exposure of Remote Code Execution in Apache Dolphinscheduler.
This issue affects Apache DolphinScheduler: before 3.2.1.
We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/02/20/4 | Mailing List Third Party Advisory |
https://github.com/apache/dolphinscheduler/pull/14991 | Issue Tracking Patch |
https://lists.apache.org/thread/5b6yq2gov0fsy9x5dkvo8ws4rr45vkn8 | Vendor Advisory |
https://lists.apache.org/thread/6kgsl93vtqlbdk6otttl0d8wmlspk0m5 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/02/20/4 | Mailing List Third Party Advisory |
https://github.com/apache/dolphinscheduler/pull/14991 | Issue Tracking Patch |
https://lists.apache.org/thread/5b6yq2gov0fsy9x5dkvo8ws4rr45vkn8 | Vendor Advisory |
https://lists.apache.org/thread/6kgsl93vtqlbdk6otttl0d8wmlspk0m5 | Vendor Advisory |
Configurations
History
18 Mar 2025, 17:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:* | |
First Time |
Apache
Apache dolphinscheduler |
|
References | () http://www.openwall.com/lists/oss-security/2024/02/20/4 - Mailing List, Third Party Advisory | |
References | () https://github.com/apache/dolphinscheduler/pull/14991 - Issue Tracking, Patch | |
References | () https://lists.apache.org/thread/5b6yq2gov0fsy9x5dkvo8ws4rr45vkn8 - Vendor Advisory | |
References | () https://lists.apache.org/thread/6kgsl93vtqlbdk6otttl0d8wmlspk0m5 - Vendor Advisory |
Information
Published : 2024-02-20 10:15
Updated : 2025-03-18 17:37
NVD link : CVE-2023-49109
Mitre link : CVE-2023-49109
CVE.ORG link : CVE-2023-49109
JSON object : View
Products Affected
apache
- dolphinscheduler
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')