We found results for “”
CVE-2022-45875
Good to know:
Date: January 4, 2023
Improper validation of script alert plugin parameters in Apache DolphinScheduler to avoid remote command execution vulnerability. This issue affects Apache DolphinScheduler version 3.0.1 and prior versions; version 3.1.0 and prior versions. This attack can be performed only by authenticated users which can login to DS.
Language: Java
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Input Validation
CWE-20Top Fix
Upgrade Version
Upgrade to version org.apache.dolphinscheduler:dolphinscheduler-alert-script:3.0.2,3.1.1, org.apache.dolphinscheduler:dolphinscheduler-alert-server:3.0.2,3.1.1
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |