First published: Tue Feb 20 2024(Updated: )
Because the HttpUtils class did not verify certificates, an attacker that could perform a Man-in-the-Middle (MITM) attack on outgoing https connections could impersonate the server. This issue affects Apache DolphinScheduler: before 3.2.0. Users are recommended to upgrade to version 3.2.1, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.dolphinscheduler:dolphinscheduler | <3.2.1 | 3.2.1 |
Apache DolphinScheduler | <3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49250 is classified as a high severity vulnerability due to the potential for Man-in-the-Middle attacks.
To fix CVE-2023-49250, users should upgrade Apache DolphinScheduler to version 3.2.1 or later.
CVE-2023-49250 affects Apache DolphinScheduler versions prior to 3.2.0.
CVE-2023-49250 allows attackers to perform a Man-in-the-Middle attack by impersonating the server.
The HttpUtils class in CVE-2023-49250 failed to verify certificates, enabling potential MITM attacks.