Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <58f6c8a8-214e-a728-5137-199133d9dcb2@apache.org>
Date: Fri, 09 Aug 2024 12:43:12 +0000
From: ShunFeng Cai <caishunfeng@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-30188: Apache DolphinScheduler: Resource File Read And
 Write Vulnerability 

Severity: important

Affected versions:

- Apache DolphinScheduler 3.1.0 before 3.2.2

Description:

File read and write vulnerability in Apache DolphinScheduler ,  authenticated users can illegally access additional resource files.
This issue affects Apache DolphinScheduler: from 3.1.0 before 3.2.2.

Users are recommended to upgrade to version 3.2.2, which fixes the issue.

Credit:

L0ne1y (reporter)
drun1baby (reporter)
Zevi (reporter)
Xun Bai (reporter)

References:

https://dolphinscheduler.apache.org
https://www.cve.org/CVERecord?id=CVE-2024-30188

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.