Lucene search

K
githubGitHub Advisory DatabaseGHSA-M9Q4-P56M-MC6Q
HistoryAug 12, 2024 - 3:30 p.m.

Apache DolphinScheduler: RCE by arbitrary js execution

2024-08-1215:30:49
CWE-20
GitHub Advisory Database
github.com
4
apache dolphinscheduler
rce
input validation
authentication
javascript
server
upgrade
switch task plugin

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.6

Confidence

High

EPSS

0

Percentile

9.5%

Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed javascript to be executed on the server. If you are using the switch task plugin, please upgrade to version 3.2.2.

Affected configurations

Vulners
Node
org.apache.dolphinschedulerdolphinschedulerRange<3.2.2
VendorProductVersionCPE
org.apache.dolphinschedulerdolphinscheduler*cpe:2.3:a:org.apache.dolphinscheduler:dolphinscheduler:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.6

Confidence

High

EPSS

0

Percentile

9.5%

Related for GHSA-M9Q4-P56M-MC6Q