dolphinscheduler-dao is vulnerable to remote code execution. Using MySQL database with connectorj, an attacker can inject a malicious code in the DolphinScheduler server through jdbc connect parameters input {"detectCustomCollations":true,"autoDeserialize":true}
.
CPE | Name | Operator | Version |
---|---|---|---|
dolphinscheduler-dao | eq | 1.3.0 |
github.com/apache/incubator-dolphinscheduler/commit/86f4276f0fd8d3d42ce9bcc13463eb015232b56f
github.com/apache/incubator-dolphinscheduler/pull/2728
lists.apache.org/thread.html/r0de5e3d5516467c9429a8d4356eca17ccf156337345ac6b104748acb@%3Ccommits.dolphinscheduler.apache.org%3E
lists.apache.org/thread.html/r33452d7b99a293bcf8f3e4bd664943847e2602e03a9e45d09d3f508a@%3Ccommits.dolphinscheduler.apache.org%3E
lists.apache.org/thread.html/r9fbe24539a873032b3e41243d44a730d6a2aae26335ac1e3271ea47d@%3Ccommits.dolphinscheduler.apache.org%3E
lists.apache.org/thread.html/ra81adacbfdd6f166f9cf155340674ffd4179386b8b75068639547c11@%3Ccommits.dolphinscheduler.apache.org%3E
lists.apache.org/thread.html/rcbe4c248ef0c566e99fd19388a6c92aeef88167286546b675e9b1769%40%3Cdev.dolphinscheduler.apache.org%3E