Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any tenant to override another users password through the API interface.
github.com/apache/incubator-dolphinscheduler
github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1
github.com/pypa/advisory-database/tree/main/vulns/apache-dolphinscheduler/PYSEC-2021-876.yaml
nvd.nist.gov/vuln/detail/CVE-2020-13922
www.mail-archive.com/[email protected]/msg06076.html