CVE-2024-23320: Apache DolphinScheduler vulnerable to arbitrary JavaScript execution as root for authenticated users
(updated )
Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed JavaScript to be executed on the server.
This issue is a legacy of CVE-2023-49299. We didn’t fix it completely in CVE-2023-49299, and we added one more patch to fix it.
This issue affects Apache DolphinScheduler: until 3.2.1.
Users are recommended to upgrade to version 3.2.1, which fixes the issue.
References
- github.com/advisories/GHSA-rc6h-qwj9-2c53
- github.com/apache/dolphinscheduler
- github.com/apache/dolphinscheduler/commit/ef9ed3db55cb1647886b06c2b2c6a5cfcdccfb5c
- github.com/apache/dolphinscheduler/pull/15487
- lists.apache.org/thread/25qhfvlksozzp6j9y8ozznvjdjp3lxqq
- lists.apache.org/thread/p7rwzdgrztdfps8x1bwx646f1mn0x6cp
- lists.apache.org/thread/tnf99qoc6tlnwrny4t1zk6mfszgdsokm
- nvd.nist.gov/vuln/detail/CVE-2024-23320
Detect and mitigate CVE-2024-23320 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →