Arbitrary File Read Vulnerability in Apache Dolphinscheduler.
This issue affects Apache DolphinScheduler: before 3.2.1.
We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/02/20/2 | Mailing List Third Party Advisory |
https://github.com/apache/dolphinscheduler/pull/15433 | Issue Tracking Patch |
https://lists.apache.org/thread/4t8bdjqnfhldh73gy9p0whlgvnnbtn7g | Mailing List Vendor Advisory |
https://lists.apache.org/thread/gpks573kn00ofxn7n9gkg6o47d03p5rw | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/02/20/2 | Mailing List Third Party Advisory |
https://github.com/apache/dolphinscheduler/pull/15433 | Issue Tracking Patch |
https://lists.apache.org/thread/4t8bdjqnfhldh73gy9p0whlgvnnbtn7g | Mailing List Vendor Advisory |
https://lists.apache.org/thread/gpks573kn00ofxn7n9gkg6o47d03p5rw | Mailing List Vendor Advisory |
Configurations
History
27 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.apache.org/thread/gpks573kn00ofxn7n9gkg6o47d03p5rw - Mailing List, Vendor Advisory |
16 Jan 2025, 19:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache dolphinscheduler
Apache |
|
References | () http://www.openwall.com/lists/oss-security/2024/02/20/2 - Mailing List, Third Party Advisory | |
References | () https://github.com/apache/dolphinscheduler/pull/15433 - Issue Tracking, Patch | |
References | () https://lists.apache.org/thread/4t8bdjqnfhldh73gy9p0whlgvnnbtn7g - Mailing List, Vendor Advisory | |
References | () https://lists.apache.org/thread/gpks573kn00ofxn7n9gkg6o47d03p5rw - Vendor Advisory | |
CPE | cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
21 Nov 2024, 08:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/02/20/2 - | |
References | () https://github.com/apache/dolphinscheduler/pull/15433 - | |
References | () https://lists.apache.org/thread/4t8bdjqnfhldh73gy9p0whlgvnnbtn7g - | |
References | () https://lists.apache.org/thread/gpks573kn00ofxn7n9gkg6o47d03p5rw - |
20 Feb 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
20 Feb 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-20 10:15
Updated : 2025-03-27 17:15
NVD link : CVE-2023-51770
Mitre link : CVE-2023-51770
CVE.ORG link : CVE-2023-51770
JSON object : View
Products Affected
apache
- dolphinscheduler
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')