CVE-2024-23320
moderate-risk
Published 2024-02-23
Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed javascript to be executed on the server. This issue is a legacy of CVE-2023-49299. We didn't fix it completely in CVE-2023-49299, and we added one more patch to fix it. This issue affects Apache DolphinScheduler: until 3.2.1. Users are recommended to upgrade to version 3.2.1, which fixes the issue.
Do I need to act?
-
0.74% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (10)
Issue Tracking
https://github.com/apache/dolphinscheduler/pull/15487
Vendor Advisory
https://lists.apache.org/thread/25qhfvlksozzp6j9y8ozznvjdjp3lxqq
Vendor Advisory
https://lists.apache.org/thread/p7rwzdgrztdfps8x1bwx646f1mn0x6cp
Vendor Advisory
https://lists.apache.org/thread/tnf99qoc6tlnwrny4t1zk6mfszgdsokm
Issue Tracking
https://github.com/apache/dolphinscheduler/pull/15487
Vendor Advisory
https://lists.apache.org/thread/25qhfvlksozzp6j9y8ozznvjdjp3lxqq
Vendor Advisory
https://lists.apache.org/thread/p7rwzdgrztdfps8x1bwx646f1mn0x6cp
Vendor Advisory
https://lists.apache.org/thread/tnf99qoc6tlnwrny4t1zk6mfszgdsokm
37
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal