Show filters
50 Total Results
Displaying 11-20 of 50
Sort by:
Attacker Value
Unknown
CVE-2023-49299
Disclosure Date: December 30, 2023 (last updated February 14, 2025)
Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed javascript to be executed on the server.This issue affects Apache DolphinScheduler: until 3.1.9.
Users are recommended to upgrade to version 3.1.9, which fixes the issue.
0
Attacker Value
Unknown
CVE-2023-49620
Disclosure Date: November 30, 2023 (last updated December 06, 2023)
Before DolphinScheduler version 3.1.0, the login user could delete UDF function in the resource center unauthorized (which almost used in sql task), with unauthorized access vulnerability (IDOR), but after version 3.1.0 we fixed this issue. We mark this cve as moderate level because it still requires user login to operate, please upgrade to version 3.1.0 to avoid this vulnerability
0
Attacker Value
Unknown
CVE-2023-49068
Disclosure Date: November 27, 2023 (last updated December 02, 2023)
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler.This issue affects Apache DolphinScheduler: before 3.2.1.
Users are recommended to upgrade to version 3.2.1, which fixes the issue. At the time of disclosure of this advisory, this version has not yet been released. In the mean time, we recommend you make sure the logs are only available to trusted operators.
0
Attacker Value
Unknown
CVE-2023-25601
Disclosure Date: April 20, 2023 (last updated February 14, 2025)
On version 3.0.0 through 3.1.1, Apache DolphinScheduler's python gateway suffered from improper authentication: an attacker could use a socket bytes attack without authentication. This issue has been fixed from version 3.1.2 onwards. For users who use version 3.0.0 to 3.1.1, you can turn off the python-gateway function by changing the value `python-gateway.enabled=false` in configuration file `application.yaml`. If you are using the python gateway, please upgrade to version 3.1.2 or above.
0
Attacker Value
Unknown
CVE-2023-0935
Disclosure Date: February 21, 2023 (last updated February 24, 2025)
A vulnerability was found in DolphinPHP up to 1.5.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file common.php of the component Incomplete Fix CVE-2021-46097. The manipulation of the argument id leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221551.
0
Attacker Value
Unknown
CVE-2022-45875
Disclosure Date: January 04, 2023 (last updated February 24, 2025)
Improper validation of script alert plugin parameters in Apache DolphinScheduler to avoid remote command execution vulnerability. This issue affects Apache DolphinScheduler version 3.0.1 and prior versions; version 3.1.0 and prior versions.
This attack can be performed only by authenticated users which can login to DS.
0
Attacker Value
Unknown
CVE-2022-26885
Disclosure Date: November 24, 2022 (last updated October 08, 2023)
When using tasks to read config files, there is a risk of database password disclosure. We recommend you upgrade to version 2.0.6 or higher.
0
Attacker Value
Unknown
CVE-2022-45462
Disclosure Date: November 23, 2022 (last updated February 24, 2025)
Alarm instance management has command injection when there is a specific command configured. It is only for logged-in users. We recommend you upgrade to version 2.0.6 or higher
0
Attacker Value
Unknown
CVE-2022-34662
Disclosure Date: November 01, 2022 (last updated February 24, 2025)
When users add resources to the resource center with a relation path will cause path traversal issues and only for logged-in users. You could upgrade to version 3.0.0 or higher
0
Attacker Value
Unknown
CVE-2022-26884
Disclosure Date: October 28, 2022 (last updated February 24, 2025)
Users can read any files by log server, Apache DolphinScheduler users should upgrade to version 2.0.6 or higher.
0