First published: Tue Feb 20 2024(Updated: )
Session Fixation Apache DolphinScheduler before version 3.2.0, which session is still valid after the password change. Users are recommended to upgrade to version 3.2.1, which fixes this issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.dolphinscheduler:dolphinscheduler | >=1.3.8<3.2.1 | 3.2.1 |
Apache DolphinScheduler | >=1.3.8<3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50270 is classified as a high severity vulnerability due to its potential to allow session fixation attacks after a password change.
To fix CVE-2023-50270, upgrade Apache DolphinScheduler to version 3.2.1 or later.
CVE-2023-50270 affects Apache DolphinScheduler versions prior to 3.2.1.
CVE-2023-50270 is a session fixation vulnerability in Apache DolphinScheduler.
CVE-2023-50270 allows attackers to maintain valid sessions even after legitimate users change their passwords, compromising account security.