Vulnerability Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler.This issue affects Apache DolphinScheduler: before 3.2.1. Users are recommended to upgrade to version 3.2.1, which fixes the issue. At the time of disclosure of this advisory, this version has not yet been released. In the mean time, we recommend you make sure the logs are only available to trusted operators.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Dolphinscheduler | < 3.2.1 |
Related Weaknesses (CWE)
References
- https://github.com/apache/dolphinscheduler/pull/15192Issue TrackingPatch
- https://lists.apache.org/thread/jn6kr6mjdgtfgpxoq9j8q4pkfsq8zmpqMailing ListVendor Advisory
- https://github.com/apache/dolphinscheduler/pull/15192Issue TrackingPatch
- https://lists.apache.org/thread/jn6kr6mjdgtfgpxoq9j8q4pkfsq8zmpqMailing ListVendor Advisory
FAQ
What is CVE-2023-49068?
CVE-2023-49068 is a vulnerability with a CVSS score of 7.5 (HIGH). Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler.This issue affects Apache DolphinScheduler: before 3.2.1. Users are recommended to upgrade to versi...
How severe is CVE-2023-49068?
CVE-2023-49068 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-49068?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Dolphinscheduler.