Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <c0001c7d-bee4-9512-e8c7-4c5e6a5cf61d@apache.org>
Date: Fri, 29 Dec 2023 02:54:22 +0000
From: Jiajie Zhong <zhongjiajie@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-49299: Apache DolphinScheduler: Arbitrary js execute as
 root for authenticated users 

Severity: important

Affected versions:

- Apache DolphinScheduler through 3.1.9

Description:

Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed javascript to be executed on the server.This issue affects Apache DolphinScheduler: through 3.1.9.

Users are recommended to upgrade to version 3.1.9, which fixes the issue.

Credit:

Eluen Siebene (finder)

References:

https://github.com/apache/dolphinscheduler/pull/15228
https://dolphinscheduler.apache.org
https://www.cve.org/CVERecord?id=CVE-2023-49299

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.