First published: Wed Jan 04 2023(Updated: )
Apache DolphinScheduler improperly validates script alert plugin parameters and is vulnerable to remote command execution. This issue affects Apache DolphinScheduler version 3.0.1 and prior versions; version 3.1.0 and prior versions. Users should upgrade to version 3.0.2 or 3.1.1.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache DolphinScheduler | <3.0.2 | |
Apache DolphinScheduler | =3.1.0 | |
maven/org.apache.dolphinscheduler:dolphinscheduler | =3.1.0 | 3.1.1 |
maven/org.apache.dolphinscheduler:dolphinscheduler | <3.0.2 | 3.0.2 |
<3.0.2 | ||
=3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45875 is a vulnerability in Apache DolphinScheduler that allows remote command execution due to improper validation of script alert plugin parameters.
CVE-2022-45875 affects Apache DolphinScheduler version 3.0.1 and prior versions, as well as version 3.1.0 and prior versions.
CVE-2022-45875 has a severity rating of 9.8 (Critical).
To fix CVE-2022-45875, users should upgrade to version 3.0.2 or later for Apache DolphinScheduler 3.0.1, and version 3.1.1 or later for Apache DolphinScheduler 3.1.0.
More information about CVE-2022-45875 can be found at the following reference: [Apache mailing list](https://lists.apache.org/thread/r0wqzkjsoq17j6ww381kmpx3jjp9hb6r).