CVE-2024-23320: Apache DolphinScheduler vulnerable to arbitrary JavaScript execution as root for authenticated users
Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed JavaScript to be executed on the server.
This issue is a legacy of CVE-2023-49299. We didn’t fix it completely in CVE-2023-49299, and we added one more patch to fix it.
This issue affects Apache DolphinScheduler: until 3.2.1.
Users are recommended to upgrade to version 3.2.1, which fixes the issue.
References
- github.com/advisories/GHSA-rc6h-qwj9-2c53
- github.com/apache/dolphinscheduler
- github.com/apache/dolphinscheduler/commit/ef9ed3db55cb1647886b06c2b2c6a5cfcdccfb5c
- github.com/apache/dolphinscheduler/pull/15487
- lists.apache.org/thread/25qhfvlksozzp6j9y8ozznvjdjp3lxqq
- lists.apache.org/thread/p7rwzdgrztdfps8x1bwx646f1mn0x6cp
- lists.apache.org/thread/tnf99qoc6tlnwrny4t1zk6mfszgdsokm
- nvd.nist.gov/vuln/detail/CVE-2024-23320
Detect and mitigate CVE-2024-23320 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →