CVE-2024-43202
moderate-risk
Published 2024-08-20
Exposure of Remote Code Execution in Apache Dolphinscheduler. This issue affects Apache DolphinScheduler: before 3.2.2. We recommend users to upgrade Apache DolphinScheduler to version 3.2.2, which fixes the issue.
Do I need to act?
~
4.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 212af27cb757fccbe617c6ba4495ac96c757d0b1
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (5)
Issue Tracking
https://github.com/apache/dolphinscheduler/pull/15758
Vendor Advisory
https://lists.apache.org/thread/nlmdp7q7l7o3l27778vxc5px24ncr5r5
Vendor Advisory
https://lists.apache.org/thread/qbhk9wqyxhrn4z7m4m343wqxpwg926nh
Third Party Advisory
https://www.cve.org/CVERecord?id=CVE-2023-49109
45
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
8/34 · Low
Exposure
5/34 · Minimal