Exposure of Remote Code Execution in Apache Dolphinscheduler.
This issue affects Apache DolphinScheduler: before 3.2.2.
We recommend users to upgrade Apache DolphinScheduler to version 3.2.2, which fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/apache/dolphinscheduler/pull/15758 | Issue Tracking Patch |
| https://lists.apache.org/thread/nlmdp7q7l7o3l27778vxc5px24ncr5r5 | Vendor Advisory |
| https://lists.apache.org/thread/qbhk9wqyxhrn4z7m4m343wqxpwg926nh | Vendor Advisory |
| https://www.cve.org/CVERecord?id=CVE-2023-49109 | Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2024/08/20/2 | Mailing List Third Party Advisory |
Configurations
History
18 Mar 2025, 15:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/apache/dolphinscheduler/pull/15758 - Issue Tracking, Patch | |
| References | () https://lists.apache.org/thread/nlmdp7q7l7o3l27778vxc5px24ncr5r5 - Vendor Advisory | |
| References | () https://lists.apache.org/thread/qbhk9wqyxhrn4z7m4m343wqxpwg926nh - Vendor Advisory | |
| References | () https://www.cve.org/CVERecord?id=CVE-2023-49109 - Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2024/08/20/2 - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:* | |
| First Time |
Apache
Apache dolphinscheduler |
Information
Published : 2024-08-20 08:15
Updated : 2025-03-18 15:57
NVD link : CVE-2024-43202
Mitre link : CVE-2024-43202
CVE.ORG link : CVE-2024-43202
JSON object : View
Products Affected
apache
- dolphinscheduler
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
