First published: Fri Nov 24 2023(Updated: )
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler. The information exposed to unauthorized actors may include sensitive data such as database credentials. Users who can't upgrade to the fixed version can also set environment variable `MANAGEMENT_ENDPOINTS_WEB_EXPOSURE_INCLUDE=health,metrics,prometheus` to workaround this, or add the following section in the `application.yaml` file ``` management: endpoints: web: exposure: include: health,metrics,prometheus ``` This issue affects Apache DolphinScheduler: from 3.0.0 before 3.0.2. Users are recommended to upgrade to version 3.0.2, which fixes the issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache DolphinScheduler | >=3.0.0<3.0.2 | |
pip/apache-dolphinscheduler | >=3.0.0<3.0.2 | 3.0.2 |
maven/org.apache.dolphinscheduler:dolphinscheduler | >=3.0.0<3.0.2 | 3.0.2 |
>=3.0.0<3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-48796.
The title of the vulnerability is CVE-2023-48796: Apache dolphinscheduler sensitive information disclosure.
The vulnerability involves the exposure of sensitive information to an unauthorized actor in Apache DolphinScheduler, potentially including database credentials.
The Apache DolphinScheduler version 3.0.0 up to and including version 3.0.2 is affected.
Users affected by this vulnerability should upgrade to version 3.0.2 of Apache DolphinScheduler or later. If upgrading is not possible, setting the environment variable MANAGEMENT_EN…