GHSA-rc6h-qwj9-2c53

Suggest an improvement
Source
https://github.com/advisories/GHSA-rc6h-qwj9-2c53
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-rc6h-qwj9-2c53/GHSA-rc6h-qwj9-2c53.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rc6h-qwj9-2c53
Aliases
  • CVE-2024-23320
Published
2024-02-23T18:30:59Z
Modified
2024-08-02T11:03:16.238309Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Apache DolphinScheduler vulnerable to arbitrary JavaScript execution as root for authenticated users
Details

Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed JavaScript to be executed on the server.

This issue is a legacy of CVE-2023-49299. We didn't fix it completely in CVE-2023-49299, and we added one more patch to fix it.

This issue affects Apache DolphinScheduler: until 3.2.1.

Users are recommended to upgrade to version 3.2.1, which fixes the issue.

Database specific
{
    "nvd_published_at": "2024-02-23T17:15:08Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-02-23T20:09:38Z"
}
References

Affected packages

Maven / org.apache.dolphinscheduler:dolphinscheduler-master

Package

Name
org.apache.dolphinscheduler:dolphinscheduler-master
View open source insights on deps.dev
Purl
pkg:maven/org.apache.dolphinscheduler/dolphinscheduler-master

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.1

Affected versions

3.*

3.0.0-alpha
3.0.0-beta-1
3.0.0-beta-2
3.0.0
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5
3.0.6
3.1.0
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.1.7
3.1.8
3.1.9
3.2.0