You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@dolphinscheduler.apache.org by 孙晓彬 <xi...@yeah.net> on 2023/12/02 11:42:15 UTC

Re: CVE-2023-49620: Apache DolphinScheduler: Authenticated users could delete UDFs in resouece center they were not authorized


ok, thanks for your reply, but i want to know the following : Hello. Recently, when I was using Dolphin, I found that all users can create and execute projects. Is there any way to create a read-only user who can only read projects in Dolphin and cannot perform tasks such as creating, executing, and deleting.
Does dolphin can make it? 
---- Replied Message ----
| From | Jiajie Zhong<zh...@apache.org> |
| Date | 11/30/2023 11:02 |
| To | <an...@apache.org> ,
<us...@dolphinscheduler.apache.org> ,
<de...@dolphinscheduler.apache.org> |
| Subject | CVE-2023-49620: Apache DolphinScheduler: Authenticated users could delete UDFs in resouece center they were not authorized |
Severity: moderate

Affected versions:

- Apache DolphinScheduler 2.0.0 before 3.1.0

Description:

Before DolphinScheduler version 3.1.0, the login user could delete UDF function in the resource center unauthorized(which almost used in sql task), with unauthorized access vulnerability(IDOR), but after version 3.1.0 we fixed this issue. We mark this cve as moderate level because it still requires user login to operate, please upgrade to version 3.1.0 to avoid this vulnerability

Credit:

Yuanheng Lab of zhongfu (finder)

References:

https://github.com/apache/dolphinscheduler/pull/10307
https://dolphinscheduler.apache.org
https://www.cve.org/CVERecord?id=CVE-2023-49620