In Apache DolphinScheduler before 1.3.6 versions, authorized users can use SQL injection in the data source center. (Only applicable to MySQL data source with internal login account password)
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/11/01/3 | Mailing List Third Party Advisory |
https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6%40%3Cdev.dolphinscheduler.apache.org%3E | Mailing List Vendor Advisory |
https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6%40%3Cdev.dolphinscheduler.apache.org%3E | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2021/11/01/3 | Mailing List Third Party Advisory |
https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6%40%3Cdev.dolphinscheduler.apache.org%3E | Mailing List Vendor Advisory |
https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6%40%3Cdev.dolphinscheduler.apache.org%3E | Mailing List Vendor Advisory |
Configurations
History
21 Nov 2024, 05:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2021/11/01/3 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6%40%3Cdev.dolphinscheduler.apache.org%3E - Mailing List, Vendor Advisory |
02 Nov 2021, 21:33
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:* | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/11/01/3 - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6@%3Cdev.dolphinscheduler.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MISC) https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6%40%3Cdev.dolphinscheduler.apache.org%3E - Mailing List, Vendor Advisory | |
CWE | CWE-89 | |
CVSS |
v2 : v3 : |
v2 : 6.0
v3 : 8.8 |
01 Nov 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Nov 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-11-01 10:15
Updated : 2024-11-21 05:58
NVD link : CVE-2021-27644
Mitre link : CVE-2021-27644
CVE.ORG link : CVE-2021-27644
JSON object : View
Products Affected
apache
- dolphinscheduler